CVE-2023-42916

An out-of-bounds read was addressed with improved input validation. This issue is fixed in iOS 17.1.2 and iPadOS 17.1.2, macOS Sonoma 14.1.2, Safari 17.1.2. Processing web content may disclose sensitive information. Apple is aware of a report that this issue may have been exploited against versions of iOS before iOS 16.7.1.
References
Link Resource
http://seclists.org/fulldisclosure/2023/Dec/12 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2023/Dec/13 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2023/Dec/3 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2023/Dec/4 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2023/Dec/5 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2023/Dec/8 Mailing List Third Party Advisory
http://seclists.org/fulldisclosure/2024/Jan/35 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2023/12/05/1 Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AD2KIHHCUBQC2YYH3FJWAHI5BG3QETOH/ Mailing List Release Notes
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P5LQS6VEI7VIZNC7QGQ62EOV45R5RJIR/ Mailing List Release Notes
https://security.gentoo.org/glsa/202401-04 Third Party Advisory
https://support.apple.com/en-us/HT214031 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT214032 Release Notes Vendor Advisory
https://support.apple.com/en-us/HT214033 Release Notes Vendor Advisory
https://support.apple.com/kb/HT214033 Release Notes Vendor Advisory
https://support.apple.com/kb/HT214034 Release Notes Vendor Advisory
https://support.apple.com/kb/HT214062 Release Notes Vendor Advisory
https://www.debian.org/security/2023/dsa-5575 Mailing List Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:a:webkitgtk:webkitgtk\+:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2023-11-30 23:15

Updated : 2024-07-03 01:41


NVD link : CVE-2023-42916

Mitre link : CVE-2023-42916

CVE.ORG link : CVE-2023-42916


JSON object : View

Products Affected

apple

  • macos
  • safari
  • iphone_os
  • ipados

webkitgtk

  • webkitgtk\+

fedoraproject

  • fedora

debian

  • debian_linux
CWE
CWE-125

Out-of-bounds Read