lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <75810290-7F93-497B-8B2C-4C6FFD8D271C@lists.apple.com>
Date: Tue, 19 Jan 2016 15:48:17 -0800
From: Apple Product Security <product-security-noreply@...ts.apple.com>
To: security-announce@...ts.apple.com
Subject: APPLE-SA-2016-01-19-3 Safari 9.0.3


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

APPLE-SA-2016-01-19-3 Safari 9.0.3

Safari 9.0.3 is now available and addresses the following:

WebKit
Available for:  OS X Mavericks v10.9.5, OS X Yosemite v10.10.5,
OS X El Capitan v10.11 to v10.11.2
Impact:  Visiting a maliciously crafted website may lead to arbitrary
code execution
Description:  Multiple memory corruption issues existed in WebKit.
These issues were addressed through improved memory handling.
CVE-ID
CVE-2016-1723 : Apple
CVE-2016-1724 : Apple
CVE-2016-1725 : Apple
CVE-2016-1726 : Apple
CVE-2016-1727 : Apple

WebKit CSS
Available for:  OS X Mavericks v10.9.5, OS X Yosemite v10.10.5,
OS X El Capitan v10.11 to v10.11.2
Impact:  Websites may know if the user has visited a given link
Description:  A privacy issue existed in the handling of the
"a:visited button" CSS selector when evaluating the containing
element's height. This was addressed through improved validation.
CVE-ID
CVE-2016-1728 : an anonymous researcher coordinated via Joe Vennix

-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - https://gpgtools.org
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=ZvEB
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ