Apple Security Advisory 11-19-2024-2 - visionOS 2.1.1 addresses code execution vulnerabilities.
23762c69b876df7ea45363b0d369784623a71b315ca3de500c66fe2e7d75aee6
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
APPLE-SA-11-19-2024-2 visionOS 2.1.1
visionOS 2.1.1 addresses the following issues.
Information about the security content is also available at
https://support.apple.com/121755.
Apple maintains a Security Releases page at
https://support.apple.com/100100 which lists recent
software updates with security advisories.
JavaScriptCore
Available for: Apple Vision Pro
Impact: Processing maliciously crafted web content may lead to arbitrary
code execution. Apple is aware of a report that this issue may have been
actively exploited on Intel-based Mac systems.
Description: The issue was addressed with improved checks.
WebKit Bugzilla: 283063
CVE-2024-44308: Clément Lecigne and Benoît Sevens of Google's Threat
Analysis Group
WebKit
Available for: Apple Vision Pro
Impact: Processing maliciously crafted web content may lead to a cross
site scripting attack. Apple is aware of a report that this issue may
have been actively exploited on Intel-based Mac systems.
Description: A cookie management issue was addressed with improved state
management.
WebKit Bugzilla: 283095
CVE-2024-44309: Clément Lecigne and Benoît Sevens of Google's Threat
Analysis Group
Instructions on how to update visionOS are available at
https://support.apple.com/118481. To check the software version
on your Apple Vision Pro, open the Settings app and choose General >
About.
All information is also posted on the Apple Security Releases
web site: https://support.apple.com/100100.
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCAAdFiEEsz9altA7uTI+rE/qX+5d1TXaIvoFAmc9I6MACgkQX+5d1TXa
IvrozQ//XVZryii8/3UFGmSvaAOBz3TwiSq0L1Od20kVvOZUUZEET0r52Y1RcQkt
sYltOgPj/Ea9L2xXUkLv8TcjWA6GkeaDWclVi9OdhNYewLXMBxwE0rDvIRVgkAwu
Dg7McdcBO0079b+9sYzMSYQFnZXgfdWImKHAhHIHjUzNDWi7n3rB19QbGJwwyTsy
lXKYKKRMxuscopPlB7Fxmtl66SWdHth0KKZj13vWNY0ZikUKNcZizgWzojWbdiKw
ozL/gJKJTLnSTMETl09q2Dy51Nk5QJ+IINXDsgqkXuy1XwlDssTHg+aQkBgn16aQ
w17rluBZ3UDm9yqtXSJOan/MQR7wvMTZzk67Rp0bBBs+SgGQ24O/H7wTrPCQiwHm
tj2HoKCCNIM3yLWJwJzn7+fB24pPL7y7adX/+mPVfiNvVIOHU5ExxrcXi70ROVky
hxzrxw6Hz01QuT8q3LZ701iPdmdp/Rcb5Vn5xhWDSac9OohGTo9Rds8li801VQR1
ZReGbo4tTs50LYQa1gu4b5nkQRWnATeeF2BdLkw6hbdCybquuHe4dvJ+Jg6cMjGS
vaRpbdrA/odPE2hfJItCaxpotCLAtpgGj+tQahHyZISYSrXrZdoWZiKBjiLWxjik
Pr+NGIs/CzXI6kwxBtLmUkJLikU1oxTiFKAA8V1mTuUCfh64lsc=
=ZhBy
-----END PGP SIGNATURE-----