lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-id: <BBBED1FF-B7AB-41BE-B5D0-1F66EE0AA244@lists.apple.com>
Date: Mon, 19 Feb 2018 13:54:18 -0800
From: Apple Product Security <product-security-noreply@...ts.apple.com>
To: security-announce@...ts.apple.com
Subject: APPLE-SA-2018-02-19-3 tvOS 11.2.6

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

APPLE-SA-2018-02-19-3 tvOS 11.2.6

tvOS 11.2.6 is now available and addresses the following:

CoreText
Available for: Apple TV 4K and Apple TV (4th generation)
Impact: Processing a maliciously crafted string may lead to heap
corruption
Description: A memory corruption issue was addressed through improved
input validation.
CVE-2018-4124: an anonymous researcher

Installation note:

Apple TV will periodically check for software updates. Alternatively,
you may manually check for software updates by selecting
"Settings -> System -> Software Update -> Update Software."

To check the current version of software, select
"Settings -> General -> About."

Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222

This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - http://gpgtools.org
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=j8I1
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ