[<prev] [next>] [day] [month] [year] [list]
Message-id: <3F75113D-65CF-4F7F-8A78-C1AD51213539@lists.apple.com>
Date: Thu, 05 Jul 2018 15:37:57 -0700
From: Apple Product Security <product-security-noreply@...ts.apple.com>
To: security-announce@...ts.apple.com
Subject: APPLE-SA-2018-7-05-1 Wi-Fi Update for Boot Camp 6.4.0
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
APPLE-SA-2018-7-05-1 Wi-Fi Update for Boot Camp 6.4.0
Wi-Fi Update for Boot Camp 6.4.0 is now available and addresses the
following:
Wi-Fi
Available for the following machines while running Boot Camp:
MacBook (Late 2009 and later), MacBook Pro (Mid 2010 and later),
MacBook Air (Late 2010 and later), Mac mini (Mid 2010 and later),
iMac (Late 2009 and later), and Mac Pro (Mid 2010 and later)
Impact: An attacker in Wi-Fi range may force nonce reuse in WPA
unicast/PTK clients (Key Reinstallation Attacks - KRACK)
Description: A logic issue existed in the handling of state
transitions. This was addressed with improved state management.
CVE-2017-13077: Mathy Vanhoef of the imec-DistriNet group at
KU Leuven
CVE-2017-13078: Mathy Vanhoef of the imec-DistriNet group at
KU Leuven
Wi-Fi
Available for the following machines while running Boot Camp:
MacBook (Late 2009 and later), MacBook Pro (Mid 2010 and later),
MacBook Air (Late 2010 and later), Mac mini (Mid 2010 and later),
iMac (Late 2009 and later), and Mac Pro (Mid 2010 and later)
Impact: An attacker in Wi-Fi range may force nonce reuse in WPA
multicast/GTK clients (Key Reinstallation Attacks - KRACK)
Description: A logic issue existed in the handling of state
transitions. This was addressed with improved state management.
CVE-2017-13080: Mathy Vanhoef of the imec-DistriNet group at
KU Leuven
Installation note:
Wi-Fi Update for Boot Camp 6.4.0 may be obtained from Apple Software
Update for Windows. Information about using Apple Software Update
for Windows is available at:
https://support.apple.com/KB/HT208038
Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----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=JpXa
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists