Apple has issued a security update for its Safari web browser that fixes a WebKit vulnerability that could allow the execution of arbitrary code if a user visited a malicious website.
In its release notes for Safari versions 6.1.6 and 7.06, the company says the flaw was caused by “multiple memory compression issues” and has been resolved through improved memory handling.
Apple cites seven Common Vulnerabilities and Exposures IDs (CVE-IDs), five discovered by itself, one by Google’s Chrome Security team and another by an anonymous researcher. As well as executing code, the flaw also allows the termination of applications.
In April, 27 bugs were fixed, many of which were also related to the WebKit browser engine that Safari uses. A number of these were also memory corruption flaws that could also have allowed attackers to gain access to people’s Mac OS X Machines.
Safari currently commands 5.16 percent of the desktop browser market, placing it in fourth position, behind Mozilla’s Firefox, Google Chrome and the various versions of Internet Explorer.
Mac OS X Yosemite is currently available as a beta, the first time a pre-release version has been made available to anyone other than developers. The final version is due to be released as a free update later this year via the Mac App Store.
Are you a security expert? Try our quiz!
Discover Silicon UK's bold new redesign—enhancing tech journalism, user experience, and client campaigns with a…
Meta vows to spend hundreds of billions of dollars on AI infrastructure as it seeks…
US Defence Department hands contracts of up to $200m each to AI leaders as White…
OpenAI pushes back release of hotly anticipated open-source model indefinitely as it seeks to compete…
Driverless taxis could see $40bn in revenues a year in mainland China, boosted by cutting-edge…
Can AI democratise design for small businesses, or will it centralise power? Explore the future…