ID

VAR-202302-1097


CVE

CVE-2023-23529


TITLE

Mistype vulnerability in multiple Apple products

Trust: 0.8

sources: JVNDB: JVNDB-2023-004737

DESCRIPTION

A type confusion issue was addressed with improved checks. This issue is fixed in iOS 15.7.4 and iPadOS 15.7.4, iOS 16.3.1 and iPadOS 16.3.1, macOS Ventura 13.2.1, Safari 16.3. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited. Safari , iPadOS , iOS Multiple Apple products have a type mixup vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 APPLE-SA-2023-02-13-2 macOS Ventura 13.2.1 macOS Ventura 13.2.1 addresses the following issues. Information about the security content is also available at https://support.apple.com/HT213633. Kernel Available for: macOS Ventura Impact: An app may be able to execute arbitrary code with kernel privileges Description: A use after free issue was addressed with improved memory management. CVE-2023-23514: Xinru Chi of Pangu Lab, Ned Williamson of Google Project Zero Shortcuts Available for: macOS Ventura Impact: An app may be able to observe unprotected user data Description: A privacy issue was addressed with improved handling of temporary files. WebKit Bugzilla: 251944 CVE-2023-23529: an anonymous researcher macOS Ventura 13.2.1 may be obtained from the Mac App Store or Apple's Software Downloads web site: https://support.apple.com/downloads/ All information is also posted on the Apple Security Updates web site: https://support.apple.com/en-us/HT201222. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Important: webkit2gtk3 security update Advisory ID: RHSA-2023:0902-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2023:0902 Issue date: 2023-02-22 CVE Names: CVE-2023-23529 ==================================================================== 1. Summary: An update for webkit2gtk3 is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux AppStream (v. 8) - aarch64, ppc64le, s390x, x86_64 3. Description: WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Package List: Red Hat Enterprise Linux AppStream (v. 8): Source: webkit2gtk3-2.36.7-1.el8_7.2.src.rpm aarch64: webkit2gtk3-2.36.7-1.el8_7.2.aarch64.rpm webkit2gtk3-debuginfo-2.36.7-1.el8_7.2.aarch64.rpm webkit2gtk3-debugsource-2.36.7-1.el8_7.2.aarch64.rpm webkit2gtk3-devel-2.36.7-1.el8_7.2.aarch64.rpm webkit2gtk3-devel-debuginfo-2.36.7-1.el8_7.2.aarch64.rpm webkit2gtk3-jsc-2.36.7-1.el8_7.2.aarch64.rpm webkit2gtk3-jsc-debuginfo-2.36.7-1.el8_7.2.aarch64.rpm webkit2gtk3-jsc-devel-2.36.7-1.el8_7.2.aarch64.rpm webkit2gtk3-jsc-devel-debuginfo-2.36.7-1.el8_7.2.aarch64.rpm ppc64le: webkit2gtk3-2.36.7-1.el8_7.2.ppc64le.rpm webkit2gtk3-debuginfo-2.36.7-1.el8_7.2.ppc64le.rpm webkit2gtk3-debugsource-2.36.7-1.el8_7.2.ppc64le.rpm webkit2gtk3-devel-2.36.7-1.el8_7.2.ppc64le.rpm webkit2gtk3-devel-debuginfo-2.36.7-1.el8_7.2.ppc64le.rpm webkit2gtk3-jsc-2.36.7-1.el8_7.2.ppc64le.rpm webkit2gtk3-jsc-debuginfo-2.36.7-1.el8_7.2.ppc64le.rpm webkit2gtk3-jsc-devel-2.36.7-1.el8_7.2.ppc64le.rpm webkit2gtk3-jsc-devel-debuginfo-2.36.7-1.el8_7.2.ppc64le.rpm s390x: webkit2gtk3-2.36.7-1.el8_7.2.s390x.rpm webkit2gtk3-debuginfo-2.36.7-1.el8_7.2.s390x.rpm webkit2gtk3-debugsource-2.36.7-1.el8_7.2.s390x.rpm webkit2gtk3-devel-2.36.7-1.el8_7.2.s390x.rpm webkit2gtk3-devel-debuginfo-2.36.7-1.el8_7.2.s390x.rpm webkit2gtk3-jsc-2.36.7-1.el8_7.2.s390x.rpm webkit2gtk3-jsc-debuginfo-2.36.7-1.el8_7.2.s390x.rpm webkit2gtk3-jsc-devel-2.36.7-1.el8_7.2.s390x.rpm webkit2gtk3-jsc-devel-debuginfo-2.36.7-1.el8_7.2.s390x.rpm x86_64: webkit2gtk3-2.36.7-1.el8_7.2.i686.rpm webkit2gtk3-2.36.7-1.el8_7.2.x86_64.rpm webkit2gtk3-debuginfo-2.36.7-1.el8_7.2.i686.rpm webkit2gtk3-debuginfo-2.36.7-1.el8_7.2.x86_64.rpm webkit2gtk3-debugsource-2.36.7-1.el8_7.2.i686.rpm webkit2gtk3-debugsource-2.36.7-1.el8_7.2.x86_64.rpm webkit2gtk3-devel-2.36.7-1.el8_7.2.i686.rpm webkit2gtk3-devel-2.36.7-1.el8_7.2.x86_64.rpm webkit2gtk3-devel-debuginfo-2.36.7-1.el8_7.2.i686.rpm webkit2gtk3-devel-debuginfo-2.36.7-1.el8_7.2.x86_64.rpm webkit2gtk3-jsc-2.36.7-1.el8_7.2.i686.rpm webkit2gtk3-jsc-2.36.7-1.el8_7.2.x86_64.rpm webkit2gtk3-jsc-debuginfo-2.36.7-1.el8_7.2.i686.rpm webkit2gtk3-jsc-debuginfo-2.36.7-1.el8_7.2.x86_64.rpm webkit2gtk3-jsc-devel-2.36.7-1.el8_7.2.i686.rpm webkit2gtk3-jsc-devel-2.36.7-1.el8_7.2.x86_64.rpm webkit2gtk3-jsc-devel-debuginfo-2.36.7-1.el8_7.2.i686.rpm webkit2gtk3-jsc-devel-debuginfo-2.36.7-1.el8_7.2.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2023-23529 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2023 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBY/Ze4dzjgjWX9erEAQhWgQ/9GiMrCVjkBDZjp93KMJ3Vy9FSK5CfdZPM bAs10t6lQcaZY/gMxEO1toymrAyoElwRzW3y6MrTdH9GzeCvU4KIETId6kuLhcS/ T2umGmsGDbU+L5Ss5jEaniEOSw8oGR+0Xju0haMs1rgrC+afC0SETnxaEiuJ/gbR pHQ6tpdnflRg2/uludssi0yAppxK7JLVqjQoEkMD1cx9icxgm+g89QIFapti21Ty dHlmaEsRyNB88LbOnWxwwyOiGCmFbsK1JLRCOm+wRBBP7wPWjIHeryPSqnigwXq0 FDNgqyDwIhgZN2uo8V5ekAgBdv8reRaUjKig1c38tG9RXNX0ao7R1LmWroHs2LdM 1p9TDWVD1QKP68yQHDUJ24tH6Q89/h2ATRSPHRfheigBM8xU82sGRyvXyM5H/dKd ploHVxNHwPeHGoU6XVtlwzLWojgieFLS2Ad13xIefQ45GPl3UUvMSqSuILeJT09x uRc/A67sXSQxT2CLp8cjPPb2FgVR3ovkqeOeldxVsBJ06Z3zuwLNl78Vz/duRBW5 axnHm9R0AXMO/sS+6Mb9K+uczPfHOT3K0S69xZuzRl7QaKVJQCTZk2MpxZkrWiuT cRViHfMol09aFctEnaLagnn+CLo/ctMCmB1fzUVDDC8djdw1v1jTQhcjPvNBwHqr Q+PO+w+7voY=ewVU -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce . ========================================================================== Ubuntu Security Notice USN-5893-1 February 27, 2023 webkit2gtk vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 22.10 - Ubuntu 22.04 LTS - Ubuntu 20.04 LTS Summary: Several security issues were fixed in WebKitGTK. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 22.10: libjavascriptcoregtk-4.0-18 2.38.5-0ubuntu0.22.10.1 libjavascriptcoregtk-4.1-0 2.38.5-0ubuntu0.22.10.1 libjavascriptcoregtk-5.0-0 2.38.5-0ubuntu0.22.10.1 libwebkit2gtk-4.0-37 2.38.5-0ubuntu0.22.10.1 libwebkit2gtk-4.1-0 2.38.5-0ubuntu0.22.10.1 libwebkit2gtk-5.0-0 2.38.5-0ubuntu0.22.10.1 Ubuntu 22.04 LTS: libjavascriptcoregtk-4.0-18 2.38.5-0ubuntu0.22.04.1 libjavascriptcoregtk-4.1-0 2.38.5-0ubuntu0.22.04.1 libwebkit2gtk-4.0-37 2.38.5-0ubuntu0.22.04.1 libwebkit2gtk-4.1-0 2.38.5-0ubuntu0.22.04.1 Ubuntu 20.04 LTS: libjavascriptcoregtk-4.0-18 2.38.5-0ubuntu0.20.04.1 libwebkit2gtk-4.0-37 2.38.5-0ubuntu0.20.04.1 This update uses a new upstream release, which includes additional bug fixes. After a standard system update you need to restart any applications that use WebKitGTK, such as Epiphany, to make all the necessary changes. For the stable distribution (bullseye), this problem has been fixed in version 2.38.5-1~deb11u1. We recommend that you upgrade your webkit2gtk packages. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 202305-32 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: High Title: WebKitGTK+: Multiple Vulnerabilities Date: May 30, 2023 Bugs: #871732, #879571, #888563, #905346, #905349, #905351 ID: 202305-32 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======= Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution. Affected packages ================ Package Vulnerable Unaffected ------------------- ------------ ------------ net-libs/webkit-gtk < 2.40.1 >= 2.40.1 Description ========== Multiple vulnerabilities have been discovered in WebKitGTK+. Please review the CVE identifiers referenced below for details. Impact ===== Please review the referenced CVE identifiers for details. Workaround ========= There is no known workaround at this time. Resolution ========= All WebKitGTK+ users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=net-libs/webkit-gtk-2.40.1" References ========= [ 1 ] CVE-2022-32885 https://nvd.nist.gov/vuln/detail/CVE-2022-32885 [ 2 ] CVE-2022-32886 https://nvd.nist.gov/vuln/detail/CVE-2022-32886 [ 3 ] CVE-2022-32888 https://nvd.nist.gov/vuln/detail/CVE-2022-32888 [ 4 ] CVE-2022-32891 https://nvd.nist.gov/vuln/detail/CVE-2022-32891 [ 5 ] CVE-2022-32923 https://nvd.nist.gov/vuln/detail/CVE-2022-32923 [ 6 ] CVE-2022-42799 https://nvd.nist.gov/vuln/detail/CVE-2022-42799 [ 7 ] CVE-2022-42823 https://nvd.nist.gov/vuln/detail/CVE-2022-42823 [ 8 ] CVE-2022-42824 https://nvd.nist.gov/vuln/detail/CVE-2022-42824 [ 9 ] CVE-2022-42826 https://nvd.nist.gov/vuln/detail/CVE-2022-42826 [ 10 ] CVE-2022-42852 https://nvd.nist.gov/vuln/detail/CVE-2022-42852 [ 11 ] CVE-2022-42856 https://nvd.nist.gov/vuln/detail/CVE-2022-42856 [ 12 ] CVE-2022-42863 https://nvd.nist.gov/vuln/detail/CVE-2022-42863 [ 13 ] CVE-2022-42867 https://nvd.nist.gov/vuln/detail/CVE-2022-42867 [ 14 ] CVE-2022-46691 https://nvd.nist.gov/vuln/detail/CVE-2022-46691 [ 15 ] CVE-2022-46692 https://nvd.nist.gov/vuln/detail/CVE-2022-46692 [ 16 ] CVE-2022-46698 https://nvd.nist.gov/vuln/detail/CVE-2022-46698 [ 17 ] CVE-2022-46699 https://nvd.nist.gov/vuln/detail/CVE-2022-46699 [ 18 ] CVE-2022-46700 https://nvd.nist.gov/vuln/detail/CVE-2022-46700 [ 19 ] CVE-2023-23517 https://nvd.nist.gov/vuln/detail/CVE-2023-23517 [ 20 ] CVE-2023-23518 https://nvd.nist.gov/vuln/detail/CVE-2023-23518 [ 21 ] CVE-2023-23529 https://nvd.nist.gov/vuln/detail/CVE-2023-23529 [ 22 ] CVE-2023-25358 https://nvd.nist.gov/vuln/detail/CVE-2023-25358 [ 23 ] CVE-2023-25360 https://nvd.nist.gov/vuln/detail/CVE-2023-25360 [ 24 ] CVE-2023-25361 https://nvd.nist.gov/vuln/detail/CVE-2023-25361 [ 25 ] CVE-2023-25362 https://nvd.nist.gov/vuln/detail/CVE-2023-25362 [ 26 ] CVE-2023-25363 https://nvd.nist.gov/vuln/detail/CVE-2023-25363 [ 27 ] CVE-2023-27932 https://nvd.nist.gov/vuln/detail/CVE-2023-27932 [ 28 ] CVE-2023-27954 https://nvd.nist.gov/vuln/detail/CVE-2023-27954 [ 29 ] CVE-2023-28205 https://nvd.nist.gov/vuln/detail/CVE-2023-28205 [ 30 ] WSA-2022-0009 https://webkitgtk.org/security/WSA-2022-0009.html [ 31 ] WSA-2022-0010 https://webkitgtk.org/security/WSA-2022-0010.html [ 32 ] WSA-2023-0001 https://webkitgtk.org/security/WSA-2023-0001.html [ 33 ] WSA-2023-0002 https://webkitgtk.org/security/WSA-2023-0002.html [ 34 ] WSA-2023-0003 https://webkitgtk.org/security/WSA-2023-0003.html Availability =========== This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/202305-32 Concerns? ======== Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ====== Copyright 2023 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. https://creativecommons.org/licenses/by-sa/2.5

Trust: 2.43

sources: NVD: CVE-2023-23529 // JVNDB: JVNDB-2023-004737 // VULHUB: VHN-451840 // VULMON: CVE-2023-23529 // PACKETSTORM: 171002 // PACKETSTORM: 170996 // PACKETSTORM: 171100 // PACKETSTORM: 171132 // PACKETSTORM: 171035 // PACKETSTORM: 171045 // PACKETSTORM: 172625

AFFECTED PRODUCTS

vendor:applemodel:safariscope:ltversion:16.3

Trust: 1.0

vendor:applemodel:macosscope:gteversion:13.0

Trust: 1.0

vendor:applemodel:ipadosscope:ltversion:15.7.4

Trust: 1.0

vendor:applemodel:ipadosscope:ltversion:16.3.1

Trust: 1.0

vendor:applemodel:macosscope:ltversion:13.2.1

Trust: 1.0

vendor:applemodel:iphone osscope:ltversion:16.3.1

Trust: 1.0

vendor:applemodel:ipadosscope:gteversion:16.0

Trust: 1.0

vendor:applemodel:iphone osscope:gteversion:16.0

Trust: 1.0

vendor:applemodel:iphone osscope:ltversion:15.7.4

Trust: 1.0

vendor:アップルmodel:safariscope: - version: -

Trust: 0.8

vendor:アップルmodel:macosscope:eqversion:13.2.1

Trust: 0.8

vendor:アップルmodel:ipadosscope: - version: -

Trust: 0.8

vendor:アップルmodel:iosscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2023-004737 // NVD: CVE-2023-23529

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2023-23529
value: HIGH

Trust: 1.0

134c704f-9b21-4f2e-91b3-4a467353bcc0: CVE-2023-23529
value: HIGH

Trust: 1.0

NVD: CVE-2023-23529
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202302-1002
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2023-23529
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 2.0

NVD: CVE-2023-23529
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNNVD: CNNVD-202302-1002 // JVNDB: JVNDB-2023-004737 // NVD: CVE-2023-23529 // NVD: CVE-2023-23529

PROBLEMTYPE DATA

problemtype:CWE-843

Trust: 1.1

problemtype:Mistake of type (CWE-843) [NVD evaluation ]

Trust: 0.8

sources: VULHUB: VHN-451840 // JVNDB: JVNDB-2023-004737 // NVD: CVE-2023-23529

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 171132 // CNNVD: CNNVD-202302-1002

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202302-1002

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-451840

PATCH

title:HT213638 Apple  Security updateurl:https://support.apple.com/en-us/HT213633

Trust: 0.8

title:Apple iOS and iPadOS Security vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=226952

Trust: 0.6

title:Debian Security Advisories: DSA-5351-1 webkit2gtk -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=66ab5c5eb36b6d298d36433d50509233

Trust: 0.1

title:Debian Security Advisories: DSA-5352-1 wpewebkit -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=4f669f3a04368a03fcf59fb2caa23121

Trust: 0.1

title:Red Hat: url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2023-23529

Trust: 0.1

title:Apple: Safari 16.3.1url:https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=f76be197090a959a2e8ad3c03a02a2ad

Trust: 0.1

title:Apple: iOS 16.3.1 and iPadOS 16.3.1url:https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=438cfee06b6a64493b519711eb37344f

Trust: 0.1

title:Apple: macOS Ventura 13.2.1url:https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories&qid=4ef147b74f6732097f493be9b69df642

Trust: 0.1

title: - url:https://www.theregister.co.uk/2023/02/15/apple_patches_zeroday_vulnerability/

Trust: 0.1

sources: VULMON: CVE-2023-23529 // CNNVD: CNNVD-202302-1002 // JVNDB: JVNDB-2023-004737

EXTERNAL IDS

db:NVDid:CVE-2023-23529

Trust: 4.1

db:JVNDBid:JVNDB-2023-004737

Trust: 0.8

db:AUSCERTid:ESB-2023.1839

Trust: 0.6

db:AUSCERTid:ESB-2023.1322

Trust: 0.6

db:AUSCERTid:ESB-2023.1150

Trust: 0.6

db:AUSCERTid:ESB-2023.1890

Trust: 0.6

db:AUSCERTid:ESB-2023.1042

Trust: 0.6

db:AUSCERTid:ESB-2023.1216

Trust: 0.6

db:AUSCERTid:ESB-2023.1001

Trust: 0.6

db:CNNVDid:CNNVD-202302-1002

Trust: 0.6

db:PACKETSTORMid:171132

Trust: 0.2

db:PACKETSTORMid:171045

Trust: 0.2

db:PACKETSTORMid:171100

Trust: 0.2

db:VULHUBid:VHN-451840

Trust: 0.1

db:VULMONid:CVE-2023-23529

Trust: 0.1

db:PACKETSTORMid:171002

Trust: 0.1

db:PACKETSTORMid:170996

Trust: 0.1

db:PACKETSTORMid:171035

Trust: 0.1

db:PACKETSTORMid:172625

Trust: 0.1

sources: VULHUB: VHN-451840 // VULMON: CVE-2023-23529 // PACKETSTORM: 171002 // PACKETSTORM: 170996 // PACKETSTORM: 171100 // PACKETSTORM: 171132 // PACKETSTORM: 171035 // PACKETSTORM: 171045 // PACKETSTORM: 172625 // CNNVD: CNNVD-202302-1002 // JVNDB: JVNDB-2023-004737 // NVD: CVE-2023-23529

REFERENCES

url:https://support.apple.com/en-us/ht213635

Trust: 2.3

url:https://support.apple.com/en-us/ht213633

Trust: 1.7

url:https://support.apple.com/en-us/ht213638

Trust: 1.7

url:https://support.apple.com/en-us/ht213673

Trust: 1.6

url:https://nvd.nist.gov/vuln/detail/cve-2023-23529

Trust: 1.5

url:https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=cve-2023-23529

Trust: 1.0

url:https://www.cisa.gov/known-exploited-vulnerabilities-catalog

Trust: 0.8

url:https://security.gentoo.org/glsa/202305-32

Trust: 0.7

url:http://seclists.org/fulldisclosure/2023/mar/20

Trust: 0.6

url:http://seclists.org/fulldisclosure/2023/may/7

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.1150

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.1042

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.1839

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.1216

Trust: 0.6

url:https://cxsecurity.com/cveshow/cve-2023-23529/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.1322

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.1890

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2023.1001

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2023-23529

Trust: 0.2

url:https://www.apple.com/support/security/pgp/

Trust: 0.2

url:https://support.apple.com/en-us/ht201222.

Trust: 0.2

url:https://www.debian.org/security/

Trust: 0.2

url:https://www.debian.org/security/faq

Trust: 0.2

url:https://www.debian.org/security/2023/dsa-5351

Trust: 0.1

url:https://www.debian.org/security/2023/dsa-5352

Trust: 0.1

url:https://support.apple.com/ht213638.

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-23522

Trust: 0.1

url:https://support.apple.com/ht213633.

Trust: 0.1

url:https://support.apple.com/downloads/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-23514

Trust: 0.1

url:https://access.redhat.com/security/team/contact/

Trust: 0.1

url:https://access.redhat.com/security/team/key/

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.1

url:https://bugzilla.redhat.com/):

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2023:0902

Trust: 0.1

url:https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.1

url:https://access.redhat.com/articles/11258

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/webkit2gtk/2.38.5-0ubuntu0.22.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/webkit2gtk/2.38.5-0ubuntu0.20.04.1

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5893-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/webkit2gtk/2.38.5-0ubuntu0.22.10.1

Trust: 0.1

url:https://security-tracker.debian.org/tracker/webkit2gtk

Trust: 0.1

url:https://security-tracker.debian.org/tracker/wpewebkit

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-46698

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-25358

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-32891

Trust: 0.1

url:https://webkitgtk.org/security/wsa-2022-0010.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-42867

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-42852

Trust: 0.1

url:https://webkitgtk.org/security/wsa-2023-0001.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-32888

Trust: 0.1

url:https://security.gentoo.org/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-46692

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-42799

Trust: 0.1

url:https://webkitgtk.org/security/wsa-2023-0002.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-23517

Trust: 0.1

url:https://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:https://webkitgtk.org/security/wsa-2022-0009.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-42824

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-46691

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-42826

Trust: 0.1

url:https://webkitgtk.org/security/wsa-2023-0003.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-23518

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-32885

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-25363

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-27932

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-42823

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-46700

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-27954

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-46699

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-25361

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-32923

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-25360

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-42863

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-32886

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-42856

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-25362

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2023-28205

Trust: 0.1

sources: VULHUB: VHN-451840 // VULMON: CVE-2023-23529 // PACKETSTORM: 171002 // PACKETSTORM: 170996 // PACKETSTORM: 171100 // PACKETSTORM: 171132 // PACKETSTORM: 171035 // PACKETSTORM: 171045 // PACKETSTORM: 172625 // CNNVD: CNNVD-202302-1002 // JVNDB: JVNDB-2023-004737 // NVD: CVE-2023-23529

CREDITS

Apple

Trust: 0.2

sources: PACKETSTORM: 171002 // PACKETSTORM: 170996

SOURCES

db:VULHUBid:VHN-451840
db:VULMONid:CVE-2023-23529
db:PACKETSTORMid:171002
db:PACKETSTORMid:170996
db:PACKETSTORMid:171100
db:PACKETSTORMid:171132
db:PACKETSTORMid:171035
db:PACKETSTORMid:171045
db:PACKETSTORMid:172625
db:CNNVDid:CNNVD-202302-1002
db:JVNDBid:JVNDB-2023-004737
db:NVDid:CVE-2023-23529

LAST UPDATE DATE

2026-03-25T19:50:11.686000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-451840date:2023-03-08T00:00:00
db:CNNVDid:CNNVD-202302-1002date:2023-05-31T00:00:00
db:JVNDBid:JVNDB-2023-004737date:2023-11-01T06:29:00
db:NVDid:CVE-2023-23529date:2025-10-23T18:04:04.480

SOURCES RELEASE DATE

db:VULHUBid:VHN-451840date:2023-02-27T00:00:00
db:PACKETSTORMid:171002date:2023-02-15T17:57:48
db:PACKETSTORMid:170996date:2023-02-15T17:38:42
db:PACKETSTORMid:171100date:2023-02-23T16:31:14
db:PACKETSTORMid:171132date:2023-02-27T14:53:17
db:PACKETSTORMid:171035date:2023-02-17T15:43:57
db:PACKETSTORMid:171045date:2023-02-17T16:14:09
db:PACKETSTORMid:172625date:2023-05-30T16:32:33
db:CNNVDid:CNNVD-202302-1002date:2023-02-13T00:00:00
db:JVNDBid:JVNDB-2023-004737date:2023-11-01T00:00:00
db:NVDid:CVE-2023-23529date:2023-02-27T20:15:14.710