lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 19 Jan 2016 15:48:17 -0800 From: Apple Product Security <product-security-noreply@...ts.apple.com> To: security-announce@...ts.apple.com Subject: APPLE-SA-2016-01-19-3 Safari 9.0.3 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 APPLE-SA-2016-01-19-3 Safari 9.0.3 Safari 9.0.3 is now available and addresses the following: WebKit Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, OS X El Capitan v10.11 to v10.11.2 Impact: Visiting a maliciously crafted website may lead to arbitrary code execution Description: Multiple memory corruption issues existed in WebKit. These issues were addressed through improved memory handling. CVE-ID CVE-2016-1723 : Apple CVE-2016-1724 : Apple CVE-2016-1725 : Apple CVE-2016-1726 : Apple CVE-2016-1727 : Apple WebKit CSS Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, OS X El Capitan v10.11 to v10.11.2 Impact: Websites may know if the user has visited a given link Description: A privacy issue existed in the handling of the "a:visited button" CSS selector when evaluating the containing element's height. This was addressed through improved validation. CVE-ID CVE-2016-1728 : an anonymous researcher coordinated via Joe Vennix -----BEGIN PGP SIGNATURE----- Comment: GPGTools - https://gpgtools.org iQIcBAEBCgAGBQJWnsHWAAoJEBcWfLTuOo7t/U8P/A8wprr7O/AsfTzeeRZC03df eASftaBsa9VLFOwpWKCWeLQo17yx7EG8B25nf1RbKbIuCh9qArKhPzMjuQchrFrW 5VcE5nbbRsWHK40cBqTGhyMCdfoK4c3ca+pRs1qXeJtz3fDcW/22ws5a7tBDkYsM Drt5yUaxqctKIERPerUbvAhe215D5aEs9P8uMPxL8TwUPmcm75RYDeeOZC0PmtiP Oc+H4K8IcgHOiy7/EMOyRy+6UJ9yXPD1oNBRAPdTzFHGrI97wkqeH2R6Z3c1Ql3L 1Nm27xdYNPcvwxjBDNq+uQh6B/0yu95oDdPjw0wXkUhcQfipp8VpnS/xlpoVJksp rg2Oh/AoSNbefmG+NxujAf3stB8X+df+D0nmdi4LL0N4jqipGvkR7AecV6XhGgVq xOkinIE3HFn70PldHnbm4NZADVyU5xzLZ7WUWzQj+OtgypDDyPr2zQ4h9laXp5KR vU0T+5DId/YUivr9wMmKW9etIRTL0rJcQD70xJqihsm0OCh2yEOa5WZdd16Cc6R/ TXkFYVHCTHHiyFzpac5Y1f77ZA3OBifXs3SPJjIjVi8LVIfxSge9OTv6P3ZdYF52 3ozFvNVjEYzgAau9FhZAeUuxX6d5YE014+SOZml5a7/gQNDMvy4q3sER5yt6GHd/ 1ALPYBGmNCuPx+y4PuZr =ZvEB -----END PGP SIGNATURE-----
Powered by blists - more mailing lists