First published: Mon Mar 27 2023(Updated: )
FontParser. The issue was addressed with improved memory handling.
Credit: Ye Zhang @VAR10CK Baidu SecurityYe Zhang Baidu SecurityYe Zhang Baidu SecurityYe Zhang @VAR10CK Baidu SecurityYe Zhang Baidu Security product-security@apple.com product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple tvOS | <16.4 | 16.4 |
Apple watchOS | <9.4 | 9.4 |
Apple iOS | <15.7.4 | 15.7.4 |
Apple iPadOS | <15.7.4 | 15.7.4 |
Apple Ipad Os | <15.7.4 | |
Apple Ipad Os | >=16.0<16.4 | |
Apple iPhone OS | <15.7.4 | |
Apple iPhone OS | >=16.0<16.4 | |
Apple macOS | >=13.0<13.3 | |
Apple tvOS | <16.4 | |
Apple watchOS | <9.4 | |
<16.4 | 16.4 | |
<16.4 | 16.4 | |
Apple macOS Ventura | <13.3 | 13.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID of this issue is CVE-2023-27956.
The severity of CVE-2023-27956 is medium, with a severity value of 5.5.
CVE-2023-27956 affects watchOS 9.4, tvOS up to 16.4, iOS up to 15.7.4, and macOS Ventura up to 13.3.
To fix CVE-2023-27956, update your software to macOS Ventura 13.3, iOS 16.4 and iPadOS 16.4, iOS 15.7.4 and iPadOS 15.7.4, tvOS 16.4, or watchOS 9.4.
Processing a maliciously crafted image may result in the disclosure of process memory.