lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <2B6DD7EF-D13E-48B7-A9A2-12EC4598089B@lists.apple.com>
Date: Mon, 25 Jan 2016 11:36:06 -0800
From: Apple Product Security <product-security-noreply@...ts.apple.com>
To: security-announce@...ts.apple.com
Subject: APPLE-SA-2016-01-25-1 tvOS 9.1.1

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

APPLE-SA-2016-01-25-1 tvOS 9.1.1

tvOS 9.1.1 is now available and addresses the following:

Disk Images
Available for:  Apple TV (4th generation)
Impact:  A local user may be able to execute arbitrary code with
kernel privileges
Description:  A memory corruption issue existed in the parsing of
disk images. This issue was addressed through improved memory
handling.
CVE-ID
CVE-2016-1717 : Frank Graziano of Yahoo! Pentest Team

IOHIDFamily
Available for:  Apple TV (4th generation)
Impact:  A local user may be able to execute arbitrary code with
kernel privileges
Description:  A memory corruption issue existed in an IOHIDFamily
API. This issue was addressed through improved memory handling.
CVE-ID
CVE-2016-1719 : Ian Beer of Google Project Zero

IOKit
Available for:  Apple TV (4th generation)
Impact:  A local user may be able to execute arbitrary code with
kernel privileges
Description:  A memory corruption issue was addressed through
improved memory handling.
CVE-ID
CVE-2016-1720 : Ian Beer of Google Project Zero

Kernel
Available for:  Apple TV (4th generation)
Impact:  A local user may be able to execute arbitrary code with
kernel privileges
Description:  A memory corruption issue was addressed through
improved memory handling.
CVE-ID
CVE-2016-1721 : Ian Beer of Google Project Zero and Ju Zhu of Trend
Micro

libxslt
Available for:  Apple TV (4th generation)
Impact:  Processing maliciously crafted XML may lead to arbitrary
code execution
Description:  A type confusion issue existed in libxslt. This issue
was addressed through improved memory handling.
CVE-ID
CVE-2015-7995 : puzzor

syslog
Available for:  Apple TV (4th generation)
Impact:  A local user may be able to execute arbitrary code with root
privileges
Description:  A memory corruption issue was addressed through
improved memory handling.
CVE-ID
CVE-2016-1722 : Joshua J. Drake and Nikias Bassen of Zimperium zLabs

WebKit
Available for:  Apple TV (4th generation)
Impact:  Processing maliciously crafted web content may lead to
arbitrary code execution
Description:  Multiple memory corruption issues existed in WebKit.
These issues were addressed through improved memory handling.
CVE-ID
CVE-2016-1724 : Apple
CVE-2016-1727 : Apple

-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - https://gpgtools.org
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=AGqd
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ