[<prev] [next>] [day] [month] [year] [list]
Message-ID: <3AFE97BE-84A3-4A09-9D58-CF1FCDC5BEBB@lists.apple.com>
Date: Fri, 15 Jul 2011 10:21:30 -0700
From: Apple Product Security <product-security-noreply@...ts.apple.com>
To: security-announce@...ts.apple.com
Subject: APPLE-SA-2011-07-15-1 iOS 4.3.4 Software Update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
APPLE-SA-2011-07-15-1 iOS 4.3.4 Software Update
iOS 4.3.4 Software Update is now available and addresses the
following:
CoreGraphics
Available for:
iOS 3.0 through 4.3.3 for iPhone 3GS and iPhone 4 (GSM),
iOS 3.1 through 4.3.3 for iPod touch (3rd generation) and later,
iOS 3.2 through 4.3.3 for iPad
Impact: Viewing a maliciously crafted PDF file may lead to an
unexpected application termination or arbitrary code execution
Description: A buffer overflow exists in FreeType's handling of
TrueType fonts. Viewing a maliciously crafted PDF file may lead to an
unexpected application termination or arbitrary code execution.
CVE-ID
CVE-2010-3855
CoreGraphics
Available for:
iOS 3.0 through 4.3.3 for iPhone 3GS and iPhone 4 (GSM),
iOS 3.1 through 4.3.3 for iPod touch (3rd generation) and later,
iOS 3.2 through 4.3.3 for iPad
Impact: Viewing a maliciously crafted PDF file may lead to an
unexpected application termination or arbitrary code execution
Description: A signedness issue exists in FreeType's handling of
Type 1 fonts. Viewing a maliciously crafted PDF file may lead to an
unexpected application termination or arbitrary code execution.
CVE-ID
CVE-2011-0226
IOMobileFrameBuffer
Available for:
iOS 3.0 through 4.3.3 for iPhone 3GS and iPhone 4 (GSM),
iOS 3.1 through 4.3.3 for iPod touch (3rd generation) and later,
iOS 3.2 through 4.3.3 for iPad
Impact: Malicious code running as the user may gain system
privileges
Description: An invalid type conversion issue exists in the use of
IOMobileFrameBuffer queueing primitives, which may allow malicious
code running as the user to gain system privileges.
CVE-ID
CVE-2011-0227
Installation note:
This update is only available through iTunes, and will not appear
in your computer's Software Update application, or in the Apple
Downloads site. Make sure you have an Internet connection and have
installed the latest version of iTunes from www.apple.com/itunes/
iTunes will automatically check Apple's update server on its weekly
schedule. When an update is detected, it will download it. When
the iPhone, iPod touch or iPad is docked, iTunes will present the
user with the option to install the update. We recommend applying
the update immediately if possible. Selecting Don't Install will
present the option the next time you connect your iPhone, iPod touch,
or iPad.
The automatic update process may take up to a week depending on the
day that iTunes checks for updates. You may manually obtain the
update via the Check for Updates button within iTunes. After doing
this, the update can be applied when your iPhone, iPod touch, or iPad
is docked to your computer.
To check that the iPhone, iPod touch, or iPad has been updated:
* Navigate to Settings
* Select General
* Select About. The version after applying this update will be
"4.3.4 (8K2)".
Information will also be posted to the Apple Security Updates
web site: http://support.apple.com/kb/HT1222
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.9 (Darwin)
iQEcBAEBAgAGBQJOHxUUAAoJEGnF2JsdZQees68IAKfVMxNu9e4y9uiqTHTJffJI
iqqAi7rw8bWHHaynyn32+XrEPnhljiaghsN1jMkt8pkkwedHuyrI7tKA8g7hrpbQ
rlZO+6dvwmbaKMUE8DuKxs2dJLE/9zaQw8rndJikxSfqTYpctcGPAMg+yMt5Y0eA
5ssBPYbl4xaDEWJIJi46oonxhdqvjBLkGG46FeS2TDk4jM5WQFFc2QfuC2ami4o7
EhOZuA6t4eNaa3CLevWkQjWwkWO2Mp2f90mOTlCLobxb3hfSf43eW/sjmjiSK1lR
121G/89TJW3DnkhU1APnoJ8EOk02U7QR1k4u7DblYxMI6WA+rhx5yYW4yRfaN9E=
=e4ew
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists