lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-id: <A4730C02-D605-4414-98E8-AB6C61C3B03F@lists.apple.com>
Date: Tue, 11 Mar 2025 16:12:47 -0700
From: Apple Product Security via Fulldisclosure <fulldisclosure@...lists.org>
To: security-announce@...ts.apple.com
Subject: [FD] APPLE-SA-03-11-2025-1 Safari 18.3.1

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

APPLE-SA-03-11-2025-1 Safari 18.3.1

Safari 18.3.1 addresses the following issues.
Information about the security content is also available at
https://support.apple.com/122285.

Apple maintains a Security Releases page at
https://support.apple.com/100100 which lists recent
software updates with security advisories.

WebKit
Available for: macOS Ventura and macOS Sonoma
Impact: Maliciously crafted web content may be able to break out of Web
Content sandbox. This is a supplementary fix for an attack that was
blocked in iOS 17.2. (Apple is aware of a report that this issue may
have been exploited in an extremely sophisticated attack against
specific targeted individuals on versions of iOS before iOS 17.2.)
Description: An out-of-bounds write issue was addressed with improved
checks to prevent unauthorized actions.
WebKit Bugzilla: 285858
CVE-2025-24201: Apple

Safari 18.3.1 may be obtained from the Mac App Store.

All information is also posted on the Apple Security Releases
web site: https://support.apple.com/100100.

This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/

-----BEGIN PGP SIGNATURE-----
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=1gat
-----END PGP SIGNATURE-----

_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: https://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ