A use-after-free issue was addressed with improved memory management. This issue is fixed in watchOS 9.5, tvOS 16.5, macOS Ventura 13.4, iOS 15.7.6 and iPadOS 15.7.6, Safari 16.5, iOS 16.5 and iPadOS 16.5. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
References
Link | Resource |
---|---|
https://security.gentoo.org/glsa/202401-04 | Third Party Advisory |
https://support.apple.com/en-us/HT213757 | Release Notes Vendor Advisory |
https://support.apple.com/en-us/HT213758 | Release Notes Vendor Advisory |
https://support.apple.com/en-us/HT213761 | Release Notes Vendor Advisory |
https://support.apple.com/en-us/HT213762 | Release Notes Vendor Advisory |
https://support.apple.com/en-us/HT213764 | Release Notes Vendor Advisory |
https://support.apple.com/en-us/HT213765 | Release Notes Vendor Advisory |
https://security.gentoo.org/glsa/202401-04 | Third Party Advisory |
https://support.apple.com/en-us/HT213757 | Release Notes Vendor Advisory |
https://support.apple.com/en-us/HT213758 | Release Notes Vendor Advisory |
https://support.apple.com/en-us/HT213761 | Release Notes Vendor Advisory |
https://support.apple.com/en-us/HT213762 | Release Notes Vendor Advisory |
https://support.apple.com/en-us/HT213764 | Release Notes Vendor Advisory |
https://support.apple.com/en-us/HT213765 | Release Notes Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 08:03
Type | Values Removed | Values Added |
---|---|---|
References | () https://security.gentoo.org/glsa/202401-04 - Third Party Advisory | |
References | () https://support.apple.com/en-us/HT213757 - Release Notes, Vendor Advisory | |
References | () https://support.apple.com/en-us/HT213758 - Release Notes, Vendor Advisory | |
References | () https://support.apple.com/en-us/HT213761 - Release Notes, Vendor Advisory | |
References | () https://support.apple.com/en-us/HT213762 - Release Notes, Vendor Advisory | |
References | () https://support.apple.com/en-us/HT213764 - Release Notes, Vendor Advisory | |
References | () https://support.apple.com/en-us/HT213765 - Release Notes, Vendor Advisory |
27 Jun 2024, 19:22
Type | Values Removed | Values Added |
---|---|---|
First Time |
Webkitgtk webkitgtk\+
Webkitgtk |
|
References | () https://security.gentoo.org/glsa/202401-04 - Third Party Advisory | |
CPE | cpe:2.3:a:webkitgtk:webkitgtk\+:*:*:*:*:*:*:*:* |
05 Jan 2024, 14:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
29 Aug 2023, 18:05
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:* |
|
First Time |
Redhat enterprise Linux
Redhat |
27 Jul 2023, 04:15
Type | Values Removed | Values Added |
---|---|---|
Summary | A use-after-free issue was addressed with improved memory management. This issue is fixed in watchOS 9.5, tvOS 16.5, macOS Ventura 13.4, iOS 15.7.6 and iPadOS 15.7.6, Safari 16.5, iOS 16.5 and iPadOS 16.5. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. |
27 Jun 2023, 12:47
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-416 | |
CPE | cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:* cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:* cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:* cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:* cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:* cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:* |
|
References | (MISC) https://support.apple.com/en-us/HT213762 - Release Notes, Vendor Advisory | |
References | (MISC) https://support.apple.com/en-us/HT213757 - Release Notes, Vendor Advisory | |
References | (MISC) https://support.apple.com/en-us/HT213761 - Release Notes, Vendor Advisory | |
References | (MISC) https://support.apple.com/en-us/HT213758 - Release Notes, Vendor Advisory | |
References | (MISC) https://support.apple.com/en-us/HT213765 - Release Notes, Vendor Advisory | |
References | (MISC) https://support.apple.com/en-us/HT213764 - Release Notes, Vendor Advisory | |
First Time |
Apple
Apple tvos Apple watchos Apple safari Apple iphone Os Apple ipados Apple macos |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
23 Jun 2023, 19:24
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-06-23 18:15
Updated : 2025-02-28 14:53
NVD link : CVE-2023-32373
Mitre link : CVE-2023-32373
CVE.ORG link : CVE-2023-32373
JSON object : View
Products Affected
apple
- watchos
- iphone_os
- ipados
- safari
- macos
- tvos
redhat
- enterprise_linux
webkitgtk
- webkitgtk\+
CWE
CWE-416
Use After Free