lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Mon, 9 Mar 2015 13:19:47 -0700
From: Apple Product Security <product-security-noreply@...ts.apple.com>
To: security-announce@...ts.apple.com
Subject: APPLE-SA-2015-03-09-2 AppleTV 7.1 

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

APPLE-SA-2015-03-09-2 AppleTV 7.1

AppleTV 7.1 is now available and addresses the following:

Apple TV
Available for:  Apple TV 3rd generation and later
Impact:  An attacker with a privileged network position may intercept
SSL/TLS connections
Description:  Secure Transport accepted short ephemeral RSA keys,
usually used only in export-strength RSA cipher suites, on
connections using full-strength RSA cipher suites. This issue, also
known as FREAK, only affected connections to servers which support
export-strength RSA cipher suites, and was addressed by removing
support for ephemeral RSA keys.
CVE-ID
CVE-2015-1067 : Benjamin Beurdouche, Karthikeyan Bhargavan, Antoine
Delignat-Lavaud, Alfredo Pironti, and Jean Karim Zinzindohoue of
Prosecco at Inria Paris

Apple TV
Available for:  Apple TV 3rd generation and later
Impact:  A malicious application may be able to execute arbitrary
code with system privileges
Description:  A type confusion issue existed in IOSurface's handling
of serialized objects. The issue was addressed through additional
type checking.
CVE-ID
CVE-2015-1061 : Ian Beer of Google Project Zero

Apple TV
Available for:  Apple TV 3rd generation and later
Impact:  An malicious application may be able to create folders in
trusted locations in the file system
Description:  An issue existed in the developer disk mounting logic
which resulted in invalid disk image folders not being deleted. This
was addressed through improved error handling.
CVE-ID
CVE-2015-1062 : TaiG Jailbreak Team


Installation note:

Apple TV will periodically check for software updates. Alternatively,
you may manually check for software updates by selecting
"Settings -> General -> Update Software".

To check the current version of software, select
"Settings -> General -> About".

Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT1222

This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/

-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.22 (Darwin)
Comment: GPGTools - http://gpgtools.org
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=gaCp
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ