{"id":"CVE-2024-23213","details":"The issue was addressed with improved memory handling. This issue is fixed in watchOS 10.3, tvOS 17.3, iOS 17.3 and iPadOS 17.3, macOS Sonoma 14.3, iOS 16.7.5 and iPadOS 16.7.5, Safari 17.3. Processing web content may lead to arbitrary code execution.","modified":"2026-03-13T07:52:59.884241Z","published":"2024-01-23T01:15:11.183Z","related":["ALSA-2024:2126","ALSA-2024:2982","MGASA-2024-0148","SUSE-SU-2024:0519-1","SUSE-SU-2024:0545-1","SUSE-SU-2024:0548-1","SUSE-SU-2024:3751-1","SUSE-SU-2024:3752-1","SUSE-SU-2024:3869-1","SUSE-SU-2024:3870-1"],"references":[{"type":"WEB","url":"https://support.apple.com/kb/HT214059"},{"type":"WEB","url":"https://support.apple.com/kb/HT214060"},{"type":"WEB","url":"https://support.apple.com/kb/HT214055"},{"type":"WEB","url":"https://support.apple.com/kb/HT214056"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2024/02/05/8"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X2VJMEDT4GL42AQVHSYOT6DIVJDZWIV4/"},{"type":"WEB","url":"https://support.apple.com/kb/HT214063"},{"type":"WEB","url":"https://support.apple.com/kb/HT214061"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/US43EQFC2IS66EA2CPAZFH2RQ6WD7PKF/"},{"type":"ADVISORY","url":"https://support.apple.com/en-us/HT214059"},{"type":"ADVISORY","url":"http://seclists.org/fulldisclosure/2024/Jan/27"},{"type":"ADVISORY","url":"https://support.apple.com/en-us/HT214055"},{"type":"ADVISORY","url":"https://support.apple.com/en-us/HT214056"},{"type":"ADVISORY","url":"http://seclists.org/fulldisclosure/2024/Jan/39"},{"type":"ADVISORY","url":"https://support.apple.com/en-us/HT214063"},{"type":"ADVISORY","url":"http://seclists.org/fulldisclosure/2024/Jan/34"},{"type":"ADVISORY","url":"https://support.apple.com/en-us/HT214060"},{"type":"ADVISORY","url":"https://support.apple.com/en-us/HT214061"},{"type":"ADVISORY","url":"http://seclists.org/fulldisclosure/2024/Jan/33"},{"type":"ADVISORY","url":"http://seclists.org/fulldisclosure/2024/Jan/36"},{"type":"ADVISORY","url":"http://seclists.org/fulldisclosure/2024/Jan/40"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"17.3"}]},{"events":[{"introduced":"0"},{"fixed":"16.7.5"}]},{"events":[{"introduced":"0"},{"fixed":"17.3"}]},{"events":[{"introduced":"0"},{"fixed":"16.7.5"}]},{"events":[{"introduced":"0"},{"fixed":"17.3"}]},{"events":[{"introduced":"14.0"},{"fixed":"14.3"}]},{"events":[{"introduced":"0"},{"fixed":"17.3"}]},{"events":[{"introduced":"0"},{"fixed":"10.3"}]}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-23213.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}