lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-id: <12E0C8BD-F1CF-4184-95AE-BE092426A1B6@lists.apple.com>
Date: Tue, 11 Mar 2025 16:14:39 -0700
From: Apple Product Security via Fulldisclosure <fulldisclosure@...lists.org>
To: security-announce@...ts.apple.com
Subject: [FD] APPLE-SA-03-11-2025-3 macOS Sequoia 15.3.2

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

APPLE-SA-03-11-2025-3 macOS Sequoia 15.3.2

macOS Sequoia 15.3.2 addresses the following issues.
Information about the security content is also available at
https://support.apple.com/122283.

Apple maintains a Security Releases page at
https://support.apple.com/100100 which lists recent
software updates with security advisories.

WebKit
Available for: macOS Sequoia
Impact: Maliciously crafted web content may be able to break out of Web
Content sandbox. This is a supplementary fix for an attack that was
blocked in iOS 17.2. (Apple is aware of a report that this issue may
have been exploited in an extremely sophisticated attack against
specific targeted individuals on versions of iOS before iOS 17.2.)
Description: An out-of-bounds write issue was addressed with improved
checks to prevent unauthorized actions.
WebKit Bugzilla: 285858
CVE-2025-24201: Apple

macOS Sequoia 15.3.2 may be obtained from the Mac App Store or Apple's
Software Downloads web site: https://support.apple.com/downloads/

All information is also posted on the Apple Security Releases
web site: https://support.apple.com/100100.

This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/

-----BEGIN PGP SIGNATURE-----
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=qyyq
-----END PGP SIGNATURE-----

_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: https://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ