Ubuntu 22.04 LTS / 23.10 : WebKitGTK vulnerabilities (USN-6631-1)

high Nessus Plugin ID 190412


The remote Ubuntu host is missing one or more security updates.


The remote Ubuntu 22.04 LTS / 23.10 host has packages installed that are affected by multiple vulnerabilities as referenced in the USN-6631-1 advisory.

- An access issue was addressed with improved access restrictions. This issue is fixed in watchOS 10.3, tvOS 17.3, iOS 17.3 and iPadOS 17.3, macOS Sonoma 14.3, iOS 16.7.5 and iPadOS 16.7.5, Safari 17.3. A maliciously crafted webpage may be able to fingerprint the user. (CVE-2024-23206)

- The issue was addressed with improved memory handling. This issue is fixed in watchOS 10.3, tvOS 17.3, iOS 17.3 and iPadOS 17.3, macOS Sonoma 14.3, iOS 16.7.5 and iPadOS 16.7.5, Safari 17.3. Processing web content may lead to arbitrary code execution. (CVE-2024-23213)

- A type confusion issue was addressed with improved checks. This issue is fixed in tvOS 17.3, iOS 17.3 and iPadOS 17.3, macOS Sonoma 14.3, iOS 16.7.5 and iPadOS 16.7.5, Safari 17.3, macOS Ventura 13.6.4, macOS Monterey 12.7.3. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been exploited. (CVE-2024-23222)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.


Update the affected packages.

See Also


Plugin Details

Severity: High

ID: 190412

File Name: ubuntu_USN-6631-1.nasl

Version: 1.1

Type: local

Agent: unix

Published: 2/12/2024

Updated: 2/12/2024

Supported Sensors: Agentless Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information


Risk Factor: High

Score: 8.4


Risk Factor: Critical

Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2024-23222


Risk Factor: High

Base Score: 8.8

Temporal Score: 8.2

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:canonical:ubuntu_linux:22.04:-:lts, cpe:/o:canonical:ubuntu_linux:23.10, p-cpe:/a:canonical:ubuntu_linux:gir1.2-javascriptcoregtk-4.0, p-cpe:/a:canonical:ubuntu_linux:gir1.2-javascriptcoregtk-4.1, p-cpe:/a:canonical:ubuntu_linux:gir1.2-javascriptcoregtk-6.0, p-cpe:/a:canonical:ubuntu_linux:gir1.2-webkit-6.0, p-cpe:/a:canonical:ubuntu_linux:gir1.2-webkit2-4.0, p-cpe:/a:canonical:ubuntu_linux:gir1.2-webkit2-4.1, p-cpe:/a:canonical:ubuntu_linux:libjavascriptcoregtk-4.0-18, p-cpe:/a:canonical:ubuntu_linux:libjavascriptcoregtk-4.0-bin, p-cpe:/a:canonical:ubuntu_linux:libjavascriptcoregtk-4.0-dev, p-cpe:/a:canonical:ubuntu_linux:libjavascriptcoregtk-4.1-0, p-cpe:/a:canonical:ubuntu_linux:libjavascriptcoregtk-4.1-dev, p-cpe:/a:canonical:ubuntu_linux:libjavascriptcoregtk-6.0-1, p-cpe:/a:canonical:ubuntu_linux:libjavascriptcoregtk-6.0-dev, p-cpe:/a:canonical:ubuntu_linux:libwebkit2gtk-4.0-37, p-cpe:/a:canonical:ubuntu_linux:libwebkit2gtk-4.0-dev, p-cpe:/a:canonical:ubuntu_linux:libwebkit2gtk-4.1-0, p-cpe:/a:canonical:ubuntu_linux:libwebkit2gtk-4.1-dev, p-cpe:/a:canonical:ubuntu_linux:libwebkitgtk-6.0-4, p-cpe:/a:canonical:ubuntu_linux:libwebkitgtk-6.0-dev, p-cpe:/a:canonical:ubuntu_linux:webkit2gtk-driver

Required KB Items: Host/cpu, Host/Ubuntu, Host/Ubuntu/release, Host/Debian/dpkg-l

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2/12/2024

Vulnerability Publication Date: 1/23/2024

CISA Known Exploited Vulnerability Due Dates: 2/13/2024

Reference Information

CVE: CVE-2024-23206, CVE-2024-23213, CVE-2024-23222

USN: 6631-1