First published: Mon Mar 27 2023(Updated: )
[Unknown description]
Credit: an anonymous researcher Mickey Jin @patch1t Xin Huang @11iaxH CVE-2023-0049 CVE-2023-0051 CVE-2023-0054 CVE-2023-0288 CVE-2023-0433 CVE-2023-0512 Gertjan Franken imecKU Leuven hazbinhotel Trend Micro Zero Day InitiativeGeorgy Kucherin @kucher1n KasperskyLeonid Bezvershenko @bzvr_ KasperskyBoris Larin @oct0xor Kaspersky KasperskyValentin Pashkov KasperskyAnonymous Trend Micro Zero Day InitiativeDohyun Lee @l33d0hyun SSD Labscrixer @pwning_me SSD LabsYe Zhang @VAR10CK Baidu SecurityJubaer Alnazi TRS Group of CompaniesCsaba Fitzl @theevilbit Offensive Securityjzhu Trend Micro Zero Day InitiativeMeysam Firouzi @R00tkitSMM Mbition Mercedesryuzaki Yiğit Can YILMAZ @yilmazcanyigit Murray Mike Pan ZhenPeng @Peterpan0927 STAR Labs SG PteArsenii Kostromin (0x3c3e) Félix Poulin-Bélanger David Pan Ogea Xinru Chi Pangu LabNed Williamson Google Project ZeroAdam Doupé ASU SEFCOMsqrtpwn an anonymous researcher Red CanaryBrandon Dalton @partyD0lphin Red CanaryMilan Tenk F FArthur Valiev FZweig Kunlun LabJoshua Jones Zhuowei Zhang developStorm Khiem Tran Mickey Jin @patch1t FFRI Security IncKoh M. Nakagawa FFRI Security Inc Offensive SecurityMasahiro Kawada @kawakatz GMO Cybersecurity by IeraeJubaer Alnazi Jabin TRS Group Of Companies Alibaba GroupWenchao Li Alibaba GroupXiaolong Bai Alibaba GroupAdam M. Guilherme Rambo Best Buddy AppsABC Research s.r.o. Mohamed Ghannam @_simo36 Chan Shue Long Offensive SecurityRıza Sabuncu @rizasabuncu JeongOhKyea Tingting Yin Tsinghua UniversityJunoh Lee at Theori CVE-2022-43551 CVE-2022-43552 Aleksandar Nikolic Cisco TalosMikko Kenttälä ) @Turmio_ SensorFuMohamed GHANNAM @_simo36 Mohamed GHANNAM Itay Iellin General Motors Product Cyber SecurityJianjun Dai 360 Vulnerability Research InstituteGuang Gong 360 Vulnerability Research InstitutePan ZhenPeng STAR Labs SG PteZechao Cai @Zech4o Zhejiang UniversityAbhay Kailasia @abhay_kailasia Lakshmi Narain College Of Technology BhopalAnton Spivak Hyeon Park @tree_segment Team ApplePIE product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/webkit2gtk | <2.38.6-0ubuntu0.20.04.1 | 2.38.6-0ubuntu0.20.04.1 |
ubuntu/webkit2gtk | <2.38.6-0ubuntu0.22.04.1 | 2.38.6-0ubuntu0.22.04.1 |
ubuntu/webkit2gtk | <2.38.6-0ubuntu0.22.10.1 | 2.38.6-0ubuntu0.22.10.1 |
ubuntu/webkit2gtk | <2.40.1-0ubuntu0.23.04.1 | 2.40.1-0ubuntu0.23.04.1 |
debian/webkit2gtk | <=2.36.4-1~deb10u1 | 2.38.6-0+deb10u1 2.40.5-1~deb11u1 2.42.1-1~deb11u2 2.40.5-1~deb12u1 2.42.1-1~deb12u1 2.42.1-2 |
debian/wpewebkit | 2.38.6-1~deb11u1 2.38.6-1 2.42.1-1 | |
redhat/webkitgtk | <2.38.6 | 2.38.6 |
redhat/webkitgtk | <2.40.1 | 2.40.1 |
Apple macOS | <13.3 | 13.3 |
tvOS | <16.4 | 16.4 |
Apple Mobile Safari | <16.4 | 16.4 |
Apple iOS, iPadOS, and watchOS | <16.4 | 16.4 |
Apple iOS, iPadOS, and watchOS | <16.4 | 16.4 |
Apple iOS, iPadOS, and watchOS | <15.7.4 | 15.7.4 |
Apple iOS, iPadOS, and watchOS | <15.7.4 | 15.7.4 |
Apple iOS, iPadOS, and watchOS | <9.4 | 9.4 |
Apple Mobile Safari | <16.4 | |
Apple iOS, iPadOS, and watchOS | <15.7.4 | |
Apple iOS, iPadOS, and watchOS | >=16.0<16.4 | |
iStyle @cosme iPhone OS | <15.7.4 | |
iStyle @cosme iPhone OS | >=16.0<16.4 | |
Apple iOS and macOS | >=13.0<13.3 | |
tvOS | <16.4 | |
Apple iOS, iPadOS, and watchOS | <9.4 | |
Debian | =10.0 | |
iPadOS | <15.7.4 | |
iPadOS | >=16.0<16.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
The vulnerability ID of this issue is CVE-2023-27954.
The severity level of CVE-2023-27954 is medium.
The affected software versions are macOS Ventura 13.3, Safari 16.4, iOS 16.4 and iPadOS 16.4, iOS 15.7.4 and iPadOS 15.7.4, tvOS 16.4, watchOS 9.4.
CVE-2023-27954 allows a website to track sensitive user information.
To fix CVE-2023-27954, update to the fixed versions of the affected software: macOS Ventura 13.3, Safari 16.4, iOS 16.4 and iPadOS 16.4, iOS 15.7.4 and iPadOS 15.7.4, tvOS 16.4, watchOS 9.4.