First published: Mon Jul 24 2023(Updated: )
Processing web content may lead to arbitrary code execution. Description: The issue was addressed with improved memory handling. <a href="https://webkitgtk.org/security/WSA-2023-0007.html">https://webkitgtk.org/security/WSA-2023-0007.html</a>
Credit: product-security@apple.com product-security@apple.com product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS | >=13.0<13.5 | |
Apple iPadOS | <16.6 | |
Apple iPhone OS | <16.6 | |
Apple watchOS | <9.6 | |
Apple tvOS | <16.6 | |
Apple Safari | <16.6 | |
ubuntu/webkit2gtk | <2.40.5 | 2.40.5 |
ubuntu/webkit2gtk | <2.40.5-0ubuntu0.22.04.1 | 2.40.5-0ubuntu0.22.04.1 |
ubuntu/webkit2gtk | <2.40.5-0ubuntu0.23.04.1 | 2.40.5-0ubuntu0.23.04.1 |
ubuntu/webkit2gtk | <2.40.5-1 | 2.40.5-1 |
Apple macOS Ventura | <13.5 | 13.5 |
Apple tvOS | <16.6 | 16.6 |
Apple watchOS | <9.6 | 9.6 |
Apple Safari | <16.6 | 16.6 |
debian/webkit2gtk | <=2.36.4-1~deb10u1<=2.38.6-0+deb10u1 | 2.42.2-1~deb11u1 2.42.5-1~deb11u1 2.42.2-1~deb12u1 2.42.5-1~deb12u1 2.42.5-1 |
debian/wpewebkit | <=2.38.6-1~deb11u1<=2.38.6-1 | 2.42.5-1 2.42.5-1.1 |
Apple iOS | <16.6 | 16.6 |
Apple iPadOS | <16.6 | 16.6 |
redhat/webkitgtk | <2.40.5 | 2.40.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
The vulnerability ID for this issue is CVE-2023-38611.
CVE-2023-38611 has a severity level of high.
CVE-2023-38611 affects Apple tvOS up to and excluding version 16.6, Apple iOS up to and excluding version 16.6, Apple iPadOS up to and excluding version 16.6, Apple watchOS up to and excluding version 9.6, Apple Safari up to and excluding version 16.6, Apple macOS Ventura up to and excluding version 13.5, Ubuntu webkit2gtk up to and excluding version 2.40.5, Ubuntu webkit2gtk-jammy up to and excluding version 2.40.5-0ubuntu0.23.04.1, and Ubuntu webkit2gtk-lunar up to and excluding version 2.40.5-0ubuntu0.22.04.1.
To fix CVE-2023-38611, update your software to the following versions: Apple tvOS 16.6, Apple iOS 16.6, Apple iPadOS 16.6, Apple watchOS 9.6, Apple Safari 16.6, Apple macOS Ventura 13.5, Ubuntu webkit2gtk 2.40.5, Ubuntu webkit2gtk-jammy 2.40.5-0ubuntu0.23.04.1, and Ubuntu webkit2gtk-lunar 2.40.5-0ubuntu0.22.04.1.
Yes, processing web content may lead to arbitrary code execution for CVE-2023-38611.