lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-id: <F2C55B02-682F-44F8-922A-635F0AD31C42@lists.apple.com>
Date: Tue, 26 Oct 2021 16:29:31 -0700
From: Apple Product Security via Fulldisclosure <fulldisclosure@...lists.org>
To: security-announce@...ts.apple.com
Subject: [FD] APPLE-SA-2021-10-26-8 Additional information for
 APPLE-SA-2021-09-20-5 Safari 15

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

APPLE-SA-2021-10-26-8 Additional information for
APPLE-SA-2021-09-20-5 Safari 15

Safari 15 addresses the following issues.
Information about the security content is also available at
https://support.apple.com/HT212816.

WebKit
Available for: macOS Big Sur and macOS Catalina
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution
Description: A type confusion issue was addressed with improved state
handling.
CVE-2021-30818: Amar Menezes (@amarekano) of Zon8Research
Entry added October 25, 2021

WebKit
Available for: macOS Big Sur and macOS Catalina
Impact: An attacker in a privileged network position may be able to
bypass HSTS
Description: A logic issue was addressed with improved restrictions.
CVE-2021-30823: David Gullasch of Recurity Labs
Entry added October 25, 2021

WebKit
Available for: macOS Big Sur and macOS Catalina
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution
Description: A use after free issue was addressed with improved
memory management.
CVE-2021-30809: an anonymous researcher
Entry added October 25, 2021

WebKit
Available for: macOS Big Sur and macOS Catalina
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution
Description: A memory corruption issue was addressed with improved
memory handling.
CVE-2021-30846: Sergei Glazunov of Google Project Zero

WebKit
Available for: macOS Big Sur and macOS Catalina
Impact: Processing maliciously crafted web content may lead to code
execution
Description: A memory corruption issue was addressed with improved
memory handling.
CVE-2021-30848: Sergei Glazunov of Google Project Zero

WebKit
Available for: macOS Big Sur and macOS Catalina
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution
Description: Multiple memory corruption issues were addressed with
improved memory handling.
CVE-2021-30849: Sergei Glazunov of Google Project Zero

WebKit
Available for: macOS Big Sur and macOS Catalina
Impact: Processing maliciously crafted web content may lead to code
execution
Description: A memory corruption vulnerability was addressed with
improved locking.
CVE-2021-30851: Samuel Groß of Google Project Zero

Installation note:

This update may be obtained from the Mac App Store.

Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222

This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/

-----BEGIN PGP SIGNATURE-----
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=ZEP6
-----END PGP SIGNATURE-----

_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ