APPLE-SA-09-15-2025-11 Safari 26
site_archiver@lists.apple.com Delivered-To: security-announce@lists.apple.com -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 APPLE-SA-09-15-2025-11 Safari 26 Safari 26 addresses the following issues. Information about the security content is also available at https://support.apple.com/125113. Apple maintains a Security Releases page at https://support.apple.com/100100 which lists recent software updates with security advisories. Safari Available for: macOS Sonoma and macOS Sequoia Impact: Visiting a malicious website may lead to address bar spoofing Description: The issue was addressed by adding additional logic. CVE-2025-43327: @RenwaX23 Safari Available for: macOS Sonoma and macOS Sequoia Impact: Processing maliciously crafted web content may lead to unexpected URL redirection Description: This issue was addressed with improved URL validation. CVE-2025-31254: Evan Waelde WebKit Available for: macOS Sonoma and macOS Sequoia Impact: A website may be able to access sensor information without user consent Description: The issue was addressed with improved handling of caches. WebKit Bugzilla: 296153 CVE-2025-43356: Jaydev Ahire WebKit Available for: macOS Sonoma and macOS Sequoia Impact: Processing maliciously crafted web content may lead to an unexpected Safari crash Description: The issue was addressed with improved memory handling. WebKit Bugzilla: 294550 CVE-2025-43272: Big Bear WebKit Available for: macOS Sonoma and macOS Sequoia Impact: Processing maliciously crafted web content may lead to an unexpected process crash Description: The issue was addressed with improved memory handling. WebKit Bugzilla: 296490 CVE-2025-43343: an anonymous researcher WebKit Available for: macOS Sonoma and macOS Sequoia Impact: Processing maliciously crafted web content may lead to an unexpected process crash Description: A correctness issue was addressed with improved checks. WebKit Bugzilla: 296042 CVE-2025-43342: an anonymous researcher WebKit Process Model Available for: macOS Sonoma and macOS Sequoia Impact: Processing maliciously crafted web content may lead to an unexpected Safari crash Description: A use-after-free issue was addressed with improved memory management. WebKit Bugzilla: 296276 CVE-2025-43368: Pawel Wylecial of REDTEAM.PL working with Trend Micro Zero Day Initiative Additional recognition libxml2 We would like to acknowledge Nathaniel Oh (@calysteon) for their assistance. Safari We would like to acknowledge HitmanAlharbi (@HitmanF15), Jaydev Ahire, Kenneth Chew for their assistance. WebKit We would like to acknowledge Bob Lord, Matthew Liang, Mike Cardwell of grepular.com, Stanley Lee Linton, Yiğit Can YILMAZ (@yilmazcanyigit) for their assistance. Safari 26 may be obtained from the Mac App Store. All information is also posted on the Apple Security Releases web site: https://support.apple.com/100100. This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEhjkl+zMLNwFiCT1o4Ifiq8DH7PUFAmjInPUACgkQ4Ifiq8DH 7PU5JA//Vb5YxJFWTN2hpfY53T0SoKS25AkdBrd8fLKHkSx37s8OhBdLgiShmwt2 qzHUJXtvl/LiyLqAE8Ovvp+TrVokioufTzYsu7F+ZPDAjD7rXDNjG1YuwnefgW6f lGU/70YGmgxTT6IlwXgnsGUo11SH9NwLEJ4c8FVpK5Cwaa7DQoq3KjTgoew+Y1WA 0lNLrUcUMO4YlLXPEZ4qDQJ+GlL/VwNarpu9UifXk2WJBYjnr8jbT39e/a95/JpC omgBHhBXcynranlhuYdQU3Ey9ZzBi75T96pWFHQ3pA/Bt2IRspzJUyHz2e5+rncm hYaz432M3B61feBSkFao7F93L2J+dIAeVt9GKN4vwzgCPmcmiDV67yW2clJ52t2p kx2jOkma4wOrlocLG3hxjx6YCanbMSDaXh9ckQeUjNADJKe8uGN9pgLaEAxIbB6t kra8i1YzHIFZsEwrr7yGU7ZRV5mam12AiuRFmE4hQyXBzM7K9xzneyf0BhDNrlmY oj8SMWeU/kjc50U2qno8SmhLjzdVCGsole7cVdBBeTLBCXtTfW1hztlbw0CWuAzN AkmhS6C2jCyolfSp0b4OOaUXD44YzHcVCl5KElAviux6ubrI0YuZbqa+cxcm9iyh 6gu9L0YDE2m+EiKEqnfbE9Ofysi3i6/B63FGFaLJz3CZfChnKJA= =KKUp -----END PGP SIGNATURE----- _______________________________________________ Do not post admin requests to the list. They will be ignored. Security-announce mailing list (Security-announce@lists.apple.com) Help/Unsubscribe/Update your Subscription: https://lists.apple.com/mailman/options/security-announce/site_archiver%40li... This email sent to site_archiver@lists.apple.com
participants (1)
-
Apple Product Security via Security-announce