lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <EE7E64BD-C30A-4203-8DD3-6C790E3DDFE9@lists.apple.com>
Date: Wed, 21 Oct 2015 10:49:10 -0700
From: Apple Product Security <product-security-noreply@...ts.apple.com>
To: security-announce@...ts.apple.com
Subject: APPLE-SA-2015-10-21-3 Safari 9.0.1

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

APPLE-SA-2015-10-21-3 Safari 9.0.1

Safari 9.0.1 is now available and addresses the following:

WebKit
Available for:  OS X Mavericks v10.9.5, OS X Yosemite v10.10.5,
and OS X El Capitan v10.11
Impact:  Visiting a maliciously crafted website may lead to arbitrary
code execution
Description:  Multiple memory corruption issues existed in WebKit.
These issues were addressed through improved memory handling.
CVE-ID
CVE-2015-5928 : Apple
CVE-2015-5929 : Apple
CVE-2015-5930 : Apple
CVE-2015-5931
CVE-2015-7002 : Apple
CVE-2015-7011 : Apple
CVE-2015-7012 : Apple
CVE-2015-7013 : Apple
CVE-2015-7014

Installation note:

Safari 9.0.1 may be obtained from the Mac App Store.

Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222

This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/

-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - http://gpgtools.org
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=zDvk
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ