Apple releases Safari 14.1 with WebKit patch for macOS Catalina and Mojave

Previously this week, Apple released iOS 14.5.1 and macOS Big Sur 11.3.1 with an essential security update that repaired a major WebKit exploit. Today the business released Safari 14.1 for users running macOS Catalina and macOS Mojave, which likewise fixes the exploit that had been being used for malicious web material.

As Apple detailed previously this week, the exploit found in WebKit had actually been exploited to perform approximate code on a users device without approval.
As the security breach has already been fixed for users running iOS 14 and macOS Big Sur, Apple has now launched a Safari update with the same security enhancements for users running macOS Catalina and macOS Mojave.

WebKit
Readily available for: macOS Catalina and macOS Mojave
Impact: Processing maliciously crafted web material might cause arbitrary code execution. Apple knows a report that this concern might have been actively made use of.
Description: A memory corruption issue was resolved with better state management.
CVE-2021-30665: yangkang (@dnpushme)&& zerokeeper & bianliang of 360 ATA
WebKit
Available for: macOS Catalina and macOS Mojave
Impact: Processing maliciously crafted web content might result in arbitrary code execution. Apple knows a report that this concern might have been actively made use of.
Description: An integer overflow was addressed with improved input recognition.
CVE-2021-30663: an anonymous scientist

Its worth keeping in mind that the same exploit was likewise fixed on older iPhone and iPad models with iOS 12.5.1, which was released earlier today to all users.
You can upgrade Safari by going to the Software Update menu in the System Preferences app on your Mac. More info about Safari 14.1 security updates can be found in this support post on Apples website.
FTC: We use earnings earning car affiliate links. More.
Take a look at 9to5Mac on YouTube for more Apple news:

Leave a Reply

Your email address will not be published. Required fields are marked *