First published: Mon Mar 27 2023(Updated: )
A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 16.4 and iPadOS 16.4, macOS Ventura 13.3. Processing web content may lead to arbitrary code execution.
Credit: product-security@apple.com product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iOS | <15.7.4 | 15.7.4 |
Apple iPadOS | <15.7.4 | 15.7.4 |
Apple Safari | <16.4 | 16.4 |
Apple iPadOS | <16.4 | |
Apple iPhone OS | <16.4 | |
Apple macOS | >=13.0<13.3 | |
WebKitGTK WebKitGTK | <2.40.1 | |
Wpewebkit Wpe Webkit | <2.40.1 | |
<16.4 | 16.4 | |
<16.4 | 16.4 | |
Apple macOS Ventura | <13.3 | 13.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2023-28198 is a use-after-free vulnerability in WebKit that allows arbitrary code execution.
CVE-2023-28198 affects iOS versions up to, but not including 16.4, iPadOS versions up to, but not including 16.4, and macOS Ventura versions up to, but not including 13.3.
CVE-2023-28198 has a severity rating of 8.8 (high).
To fix CVE-2023-28198, update your iOS device to version 16.4, iPadOS device to version 16.4, or macOS Ventura device to version 13.3.
You can find more information about CVE-2023-28198 at the following references: [link1], [link2], [link3].