A use after free issue exists in WebKit's handling of attribute manipulation. Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. This issue is addressed through improved memory reference tracking. References: Bugzilla: https://bugs.webkit.org/show_bug.cgi?id=33850 Trac: http://trac.webkit.org/changeset/53501, http://trac.webkit.org/changeset/53504 Acknowledgements: Red Hat would like to thank Drew Yao of Apple Product Security for responsibly reporting this issue. Upstream acknowledges Ralf Philipp Weinmann working with TippingPoint's Zero Day Initiative as the original reporter.
Public via: [1] http://support.apple.com/kb/HT4196