lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <201512082226.tB8MQp7c016254@sf01web2.securityfocus.com> Date: Tue, 8 Dec 2015 22:26:51 GMT From: submit@...ec.org To: bugtraq@...urityfocus.com Subject: MacOS/iPhone/Apple Watch/Apple TV libc File System Buffer Overflow Hi @ll, Today Apple fixed buffer overflow issue in LIBC/FTS (CVE-2015-7039). Patch available for: - OS X El Capitan v10.11 and v10.11.1 - iPhone 4s and later, - Apple Watch Sport, Apple Watch, Apple Watch Edition, and Apple Watch Hermes - Apple TV (4th generation) Impact: Processing a maliciously crafted package may lead to arbitrary code execution Description: Multiple buffer overflows existed in the C standard library. These issues were addressed through improved bounds Conception and description of issue here: https://cxsecurity.com/issue/WLB-2015100149 Best Regards, Maksymilian Arciemowicz (http://cert.cx) https://cxsecurity.com - Independent Information
Powered by blists - more mailing lists