-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 APPLE-SA-2015-10-21-3 Safari 9.0.1 Safari 9.0.1 is now available and addresses the following: WebKit Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5, and OS X El Capitan v10.11 Impact: Visiting a maliciously crafted website may lead to arbitrary code execution Description: Multiple memory corruption issues existed in WebKit. These issues were addressed through improved memory handling. CVE-ID CVE-2015-5928 : Apple CVE-2015-5929 : Apple CVE-2015-5930 : Apple CVE-2015-5931 CVE-2015-7002 : Apple CVE-2015-7011 : Apple CVE-2015-7012 : Apple CVE-2015-7013 : Apple CVE-2015-7014 Installation note: Safari 9.0.1 may be obtained from the Mac App Store. Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Comment: GPGTools - http://gpgtools.org iQIcBAEBCAAGBQJWJuKoAAoJEBcWfLTuOo7tQ8YP/ieu4DNHiWf2t6YPvIDpvm8P G440Ayh2KwVbMWSf56rCJJuYpys1xLrbXqzUSW84c/k+Tci+Xjx02Y4qUL0fmp2S zJZ6dsQY3ul7dNrkghNQv4woCn7wL6mpPbQanEIs5eWf6bC1SWuwPoe9LO8cQ27S MA5l442ROSZDpaYUYOQQ/h6Ypj4KdH3FS6IBdcrzeInk7yznGZtFvcyrBXVmrYCt Y4bZLXpnlY+lJEJT/1wkFTYkTpH8jNF36xZIRckARcw1bfrjo4lK688m++r22zSk SFwUbPIbnYsih51nTU4EJZyQ2IfviS5A0fHbcn1OdGqrY4ZjXZl0MeJuahj75Zul hy6EpHP02WmcC0htjqDQrCXNmLI6rdbAW/qYC8+SuOOwrjiPn7JGaBLk6UCB8gdR HhITysu2Ca4qjax0Uze09rf9LSZ3JsFKQ1vFPrBnQONfD4uypws0SiSin0rHxJVx n3IVGVgrwY2WoCP30yd9lXdwTx1/C9ZvYm/e7FAVM4Q1VJEKKOxK2LzyTuiTReNW IsszfgL9xWpg8SDVhqHq5orZlozSwY0FCsJ5OPtdvlZtrsQmdIcxAeYexsnczs8N zg0hVrLmJ7at1dOxzSqHrFhlK9bs9/6agZQ8MH9/KFLu0+PBogygAdqzJrMPFKkY Jj7kkz3aijlPfZqspTun =zDvk -----END PGP SIGNATURE-----