First published: Mon Jul 24 2023(Updated: )
OpenSSH. The issue was addressed with additional restrictions on the observability of app states.
Credit: James Duffy (mangoSecure) James Duffy (mangoSecure) James Duffy (mangoSecure) product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS Monterey | <12.6.8 | 12.6.8 |
Apple macOS | >=11.0<11.7.9 | |
Apple macOS | >=12.0.0<12.6.8 | |
Apple macOS | >=13.0<13.5 | |
Apple macOS | <11.7.9 | 11.7.9 |
Apple macOS | <13.5 | 13.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2023-42829 has a high severity rating due to its impact on the observability of application states in OpenSSH.
To fix CVE-2023-42829, update OpenSSH to a version that addresses the vulnerability.
CVE-2023-42829 affects multiple versions of macOS Monterey, Big Sur, and Ventura.
As of now, there have been no confirmed reports of CVE-2023-42829 being exploited in the wild.
The products linked to CVE-2023-42829 are Apple macOS Monterey, Big Sur, and Ventura.