zoukankan      html  css  js  c++  java
  • APPLE-SA-2019-3-25-4 Safari 12.1

    APPLE-SA-2019-3-25-4 Safari 12.1

    Safari 12.1 is now available and addresses the following:

    Safari Reader
    Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, and
    Mojave 10.14.4
    Impact: Enabling the Safari Reader feature on a maliciously crafted
    webpage may lead to universal cross site scripting
    Description: A logic issue was addressed with improved validation.
    CVE-2019-6204: Ryan Pickren (ryanpickren.com)
    CVE-2019-8505: Ryan Pickren (ryanpickren.com)

    WebKit
    Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, and
    Mojave 10.14.4
    Impact: Processing maliciously crafted web content may lead to
    arbitrary code execution
    Description: A type confusion issue was addressed with improved
    memory handling.
    CVE-2019-8506: Samuel Groß of Google Project Zero

    WebKit
    Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, and
    Mojave 10.14.4
    Impact: Processing maliciously crafted web content may lead to
    arbitrary code execution
    Description: A memory corruption issue was addressed with improved
    state management.
    CVE-2019-8535: Zhiyang Zeng (@Wester) of Tencent Blade Team

    WebKit
    Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, and
    Mojave 10.14.4
    Impact: Processing maliciously crafted web content may lead to
    arbitrary code execution
    Description: Multiple memory corruption issues were addressed with
    improved memory handling.
    CVE-2019-6201: dwfault working with ADLab of Venustech
    CVE-2019-8518: Samuel Groß of Google Project Zero
    CVE-2019-8523: Apple
    CVE-2019-8524: G. Geshev working with Trend Micro Zero Day Initiative
    CVE-2019-8558: Samuel Groß of Google Project Zero
    CVE-2019-8559: Apple
    CVE-2019-8563: Apple

    WebKit
    Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, and
    Mojave 10.14.4
    Impact: Processing maliciously crafted web content may disclose
    sensitive user information
    Description: A cross-origin issue existed with the fetch API. This
    was addressed with improved input validation.
    CVE-2019-8515: James Lee (@Windowsrcer)

    WebKit
    Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, and
    Mojave 10.14.4
    Impact: Processing maliciously crafted web content may lead to
    arbitrary code execution
    Description: A memory corruption issue was addressed with improved
    memory handling.
    CVE-2019-8536: Apple
    CVE-2019-8544: an anonymous researcher

    WebKit
    Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, and
    Mojave 10.14.4
    Impact: Processing maliciously crafted web content may lead to
    arbitrary code execution
    Description: A use after free issue was addressed with improved
    memory management.
    CVE-2019-7285: dwfault working at ADLab of Venustech
    CVE-2019-8556: Apple

    WebKit
    Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, and
    Mojave 10.14.4
    Impact: A malicious website may be able to execute scripts in the
    context of another website
    Description: A logic issue was addressed with improved validation.
    CVE-2019-8503: Linus Särud of Detectify

    WebKit
    Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, and
    Mojave 10.14.4
    Impact: Processing maliciously crafted web content may result in the
    disclosure of process memory
    Description: A validation issue was addressed with improved logic.
    CVE-2019-7292: Zhunki and Zhiyi Zhang of 360 ESG Codesafe Team

    WebKit
    Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, and
    Mojave 10.14.4
    Impact: A sandboxed process may be able to circumvent sandbox
    restrictions
    Description: A memory corruption issue was addressed with improved
    validation.
    CVE-2019-8562: Wen Xu of SSLab at Georgia Tech and Hanqing Zhao of
    Chaitin Security Research Lab

    WebKit
    Available for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, and
    Mojave 10.14.4
    Impact: Processing maliciously crafted web content may lead to
    universal cross site scripting
    Description: A logic issue was addressed with improved validation.
    CVE-2019-8551: Ryan Pickren (ryanpickren.com)

    Additional recognition

    Safari
    We would like to acknowledge Nikhil Mittal (@c0d3G33k) of Payatu Labs
    (payatu.com) for their assistance.

    WebKit
    We would like to acknowledge Andrey Kovalev of Yandex Security Team
    for their assistance.

    Installation note:

    Safari 12.1 may be obtained from the Mac App Store.

    Information will also be posted to the Apple Security Updates
    web site: https://support.apple.com/kb/HT201222

    This message is signed with Apple's Product Security PGP key,
    and details are available at:
    https://www.apple.com/support/security/pgp/

  • 相关阅读:
    ubuntu搭建php开发环境记录
    zz-什么是网关,路由,dns,通俗讲解
    如何设置root用户密码
    zz三台centos7虚拟机设置相互免密码登录
    go之闭包及其应用
    网络是怎样连接的
    进程间通信方式探索
    现代操作系统——操作系统概念
    现代操作系统——硬件_IO设备——设备控制器和设备本身
    simotion byte/word ASCII码转换为字符、字符串
  • 原文地址:https://www.cnblogs.com/iAmSoScArEd/p/10604134.html
Copyright © 2011-2022 走看看