First published: Mon Mar 27 2023(Updated: )
A use-after-free issue was addressed with improved memory management. This issue is fixed in macOS Ventura 13.3, macOS Big Sur 11.7.5, macOS Monterey 12.6.4. An app may be able to execute arbitrary code with kernel privileges.
Credit: Murray Mike Murray Mike Murray Mike product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS | <11.7.5 | |
Apple macOS | >=12.0.0<12.6.4 | |
Apple macOS | >=13.0<13.3 | |
<12.6.4 | 12.6.4 | |
<11.7.5 | 11.7.5 | |
Apple macOS Ventura | <13.3 | 13.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID for this issue is CVE-2023-32378.
The title of this vulnerability is 'IOAcceleratorFamily. A use-after-free issue was addressed with improved memory management.'
The affected software is Apple macOS Ventura version up to 13.3.
The vulnerability was addressed with improved memory management.
You can find more information about this vulnerability in the following reference link: [Apple Support](https://support.apple.com/en-us/HT213670).