lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 13 Sep 2016 12:33:40 -0700 From: Apple Product Security <product-security-noreply@...ts.apple.com> To: security-announce@...ts.apple.com Subject: [FD] APPLE-SA-2016-09-13-3 watchOS 3 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 APPLE-SA-2016-09-13-3 watchOS 3 watchOS 3 is now available and addresses the following: GeoServices Available for: Apple Watch Sport, Apple Watch, Apple Watch Edition, and Apple Watch Hermès Impact: An application may be able to read sensitive location information Description: A permissions issue existed in PlaceData. This issue was addressed through improved permission validation. CVE-2016-4719 : Razvan Deaconescu, Mihai Chiroiu (University POLITEHNICA of Bucharest); Luke Deshotels, William Enck (North Carolina State University); Lucas Vincenzo Davi, Ahmad-Reza Sadeghi (TU Darmstadt) Installation note: Instructions on how to update your Apple Watch software are available at https://support.apple.com/kb/HT204641 To check the version on your Apple Watch, open the Apple Watch app on your iPhone and select "My Watch > General > About". Alternatively, on your watch, select "My Watch > General > About". Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Comment: GPGTools - https://gpgtools.org iQIcBAEBCgAGBQJX2FKAAAoJEIOj74w0bLRGPC8QALeSiW402biBT/NXTQNxgUzX 071gkozqOK8NLFd/8u2Mllug/YEhTrIQjcnhNqqAo+8DbrTYUZEWPiflz6cAut/1 qxnOXv4fUSwmsND181oDZicIlzovL8RTe9xNrallEOiC0YwWKz+7S08PBc5ZyN2S erKyGmYahxDGc1ywvPHeHIivpcVJsCbqjwTr+5bvBdGbsxRF8AnFS+Ork9YLYfAE MY5JSl1IdeC/rDButd+Ff3/bfF37VqYpSMo5WzaavPrhAhVyv7aNSlU6abH56CjH wzqi8bqBexGcmzrHBEZXcOnhWXJ/LAUrwaSxGbPcWMEjkWmqm8Cgn6du9S1wyAhp d4RL6EtppXDArt61rA/mBfTK2hp4TnLj3qfuCGO9b7Dlj/XUZWlgG3/BI41SDHVt IRiSzzWNmcMMpuwCs1klrP2c+OUTr4UBZPxGUL3TPqoxy0nzPoNU9hPj/UJMVqbe OwpNLUd7jeBZd9SqkkxM3aC+ZxfRXHuQfCHTMDag3d6IviTxE7SBuMt/qWiPuzzp g5Jkz3NBUrbpb5wzBlDF5jpFCXm91t50iBY4Sx2Bqt7ienLnYjzti7pmNsaLYNt1 k8BCFQejcyjjk4tT3+w0/RIUdqn5nlBX8I9BXTU6/lKoSvbl/ozy3n5ouZnUyofP waNYuGVk6p7iS9y6x+Fi =rrFr -----END PGP SIGNATURE----- _______________________________________________ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists