First published: Thu May 18 2023(Updated: )
MallocStackLogging. This issue was addressed with improved file handling.
Credit: Gergely Kalman @gergely_kalman Gergely Kalman @gergely_kalman Gergely Kalman @gergely_kalman Gergely Kalman @gergely_kalman Gergely Kalman @gergely_kalman product-security@apple.com product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS Monterey | <12.6.6 | 12.6.6 |
Apple Ipad Os | <16.5 | |
Apple iPhone OS | <16.5 | |
Apple macOS | >=13.0<13.4 | |
Apple tvOS | <16.5 | |
Apple watchOS | <9.5 | |
Apple tvOS | <16.5 | 16.5 |
Apple iOS | <16.5 | 16.5 |
Apple iPadOS | <16.5 | 16.5 |
Apple macOS Ventura | <13.4 | 13.4 |
Apple watchOS | <9.5 | 9.5 |
Apple iPadOS | <16.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2023-32428 is a vulnerability that allows an app to gain root privileges on macOS Ventura 13.4, tvOS 16.5, iOS 16.5, iPadOS 16.5, and watchOS 9.5.
CVE-2023-32428 was addressed with improved file handling.
The severity of CVE-2023-32428 is high with a severity value of 7.8.
macOS Ventura versions up to 13.4, tvOS versions up to 16.5, iOS versions up to 16.5, iPadOS versions up to 16.5, and watchOS versions up to 9.5 are affected by CVE-2023-32428.
More information about CVE-2023-32428 can be found at the following links: [Support Article 1](https://support.apple.com/en-us/HT213764), [Support Article 2](https://support.apple.com/en-us/HT213761), and [Support Article 3](https://support.apple.com/en-us/HT213758).