First published: Thu May 18 2023(Updated: )
A use-after-free issue was addressed with improved memory management. This issue is fixed in watchOS 9.5, tvOS 16.5, macOS Ventura 13.4, iOS 15.7.6 and iPadOS 15.7.6, Safari 16.5, iOS 16.5 and iPadOS 16.5. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
Credit: product-security@apple.com product-security@apple.com product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple Safari | <16.5 | 16.5 |
Apple iOS | <15.7.6 | 15.7.6 |
Apple iPadOS | <15.7.6 | 15.7.6 |
ubuntu/webkit2gtk | <2.40.2 | 2.40.2 |
ubuntu/webkit2gtk | <2.40.4-0ubuntu0.22.04.1 | 2.40.4-0ubuntu0.22.04.1 |
ubuntu/webkit2gtk | <2.40.4-0ubuntu0.23.04.1 | 2.40.4-0ubuntu0.23.04.1 |
debian/webkit2gtk | <=2.36.4-1~deb10u1<=2.38.6-0+deb10u1 | 2.42.2-1~deb11u1 2.42.5-1~deb11u1 2.42.2-1~deb12u1 2.42.5-1~deb12u1 2.42.5-1 |
debian/wpewebkit | <=2.38.6-1~deb11u1<=2.38.6-1 | 2.42.5-1 2.42.5-1.1 |
Apple iOS | <16.5 | 16.5 |
Apple iPadOS | <16.5 | 16.5 |
Apple tvOS | <16.5 | 16.5 |
Apple watchOS | <9.5 | 9.5 |
Apple Multiple Products | ||
Apple Safari | <16.5 | |
Apple iPadOS | <15.7.6 | |
Apple iPadOS | >=16.0<16.5 | |
Apple iPhone OS | >=15.0.0<15.7.6 | |
Apple iPhone OS | >=16.0<16.5 | |
Apple macOS | <13.4 | |
Apple tvOS | <16.5 | |
Apple watchOS | <9.5 | |
Red Hat Enterprise Linux | =6.0 | |
Red Hat Enterprise Linux | =7.0 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux | =9.0 | |
Apple iPhone OS | >=15.0<15.7.6 | |
Webkitgtk Webkitgtk\+ | <2.42.3 | |
Apple macOS | <13.4 | 13.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
CVE-2023-32373 is a use-after-free vulnerability in Apple Multiple Products WebKit.
The severity of CVE-2023-32373 is high with a CVSS score of 8.8.
The affected software versions include watchOS 9.5, tvOS 16.5, macOS Ventura 13.4, iOS 15.7.6 and iPadOS 15.7.6, Safari 16.5, iOS 16.5, and iPadOS 16.5.
To fix CVE-2023-32373, update your software to the fixed versions: watchOS 9.5, tvOS 16.5, macOS Ventura 13.4, iOS 15.7.6 and iPadOS 15.7.6, Safari 16.5, iOS 16.5, and iPadOS 16.5.
You can find more information about CVE-2023-32373 on the Apple support website: [Link](https://support.apple.com/en-us/HT213757), [Link](https://support.apple.com/en-us/HT213758), [Link](https://support.apple.com/en-us/HT213761).