—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
APPLE-SA-2015-10-21-3 Safari 9.0.1
Safari 9.0.1 is now available and addresses the following:
WebKit
Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5,
and OS X El Capitan v10.11
Impact: Visiting a maliciously crafted website may lead to arbitrary
code execution
Description: Multiple memory corruption issues existed in WebKit.
These issues were addressed through improved memory handling.
CVE-ID
CVE-2015-5928 : Apple
CVE-2015-5929 : Apple
CVE-2015-5930 : Apple
CVE-2015-5931
CVE-2015-7002 : Apple
CVE-2015-7011 : Apple
CVE-2015-7012 : Apple
CVE-2015-7013 : Apple
CVE-2015-7014
Installation note:
Safari 9.0.1 may be obtained from the Mac App Store.
Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222
This message is signed with Apple’s Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
—–BEGIN PGP SIGNATURE—–
Comment: GPGTools – http://gpgtools.org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=zDvk
—–END PGP SIGNATURE—–
_______________________________________________
Do not post admin requests to the list. They will be ignored.
Security-announce mailing list (Security-announce@lists.apple.com)