lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Mon, 17 Sep 2018 11:23:23 -0700
From: Apple Product Security <product-security-noreply@...ts.apple.com>
To: security-announce@...ts.apple.com
Subject: [FD] APPLE-SA-2018-9-17-3 tvOS 12

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

APPLE-SA-2018-9-17-3 tvOS 12

tvOS 12 is now available and addresses the following:

Bluetooth
Available for: Apple TV (4th generation)
Impact: An attacker in a privileged network position may be able to
intercept Bluetooth traffic
Description: An input validation issue existed in Bluetooth. This
issue was addressed with improved input validation.
CVE-2018-5383: Lior Neumann and Eli Biham

iTunes Store
Available for: Apple TV 4K and Apple TV (4th generation)
Impact: An attacker in a privileged network position may be able to
spoof password prompts in the iTunes Store
Description: An input validation issue was addressed with improved
input validation.
CVE-2018-4305: Jerry Decime

Kernel
Available for: Apple TV 4K and Apple TV (4th generation)
Impact: An application may be able to read restricted memory
Description: An input validation issue existed in the kernel. This
issue was addressed with improved input validation.
CVE-2018-4363: Ian Beer of Google Project Zero

Safari
Available for: Apple TV 4K and Apple TV (4th generation)
Impact: A local user may be able to discover websites a user has
visited
Description: A consistency issue existed in the handling of
application snapshots. The issue was addressed with improved handling
of application snapshots.
CVE-2018-4313: 11 anonymous researchers, David Scott,
Enes Mert Ulu of Abdullah Mürşide Özünenek Anadolu Lisesi -
Ankara/Türkiye, Mehmet Ferit Daştan of Van Yüzüncü Yıl
University, Metin Altug Karakaya of Kaliptus Medical Organization,
Vinodh Swami of Western Governor's University (WGU)

Security
Available for: Apple TV 4K and Apple TV (4th generation)
Impact: An attacker may be able to exploit weaknesses in the RC4
cryptographic algorithm
Description: This issue was addressed by removing RC4.
CVE-2016-1777: Pepi Zawodsky

Installation note:

Apple TV will periodically check for software updates. Alternatively,
you may manually check for software updates by selecting
"Settings -> System -> Software Update -> Update Software."

To check the current version of software, select
"Settings -> General -> About."

Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222

This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----

iQIzBAEBCAAdFiEEDNXJVNCJJEAVmJdZeC9tht7TK3EFAlud5zQACgkQeC9tht7T
K3GiYQ/+ICUWZ9g5pgue1pw5NrMiB3GmCjBMZ2TvFcDI3f5eEoJuEuzHedbjG+z5
0Rsck24qaQ6zWMTXmEH4DMQuWhKjIDSKDekUT4vL8tn4BisQ01QVHbtAmm20iKwV
GNlTkbnsfnSaXqA7IZu4FsAiuUjOenGtesYOX+jIqQ2gMAwyMOGZdJjbwukHlvKN
ukzqWITwewXb6fqDHGkrkmgAaxYf4drt3E6e5kXXa50MxcYMevHkcxTbFdDOfG6S
F9155xwqQtXasKWTpbTYyIJr349hy3Tjz559jSH863w6K7gnFbNquvQCqDMgA8dR
wlHLUqTcZm0p3tE/5m07biLK2agoJEhHZtk/VOYsZMwame+H4HPzn8avzHHqfDPI
phVRxeIiTKgm/rZpDZK18AQhBX3LrPdh4lpgcfNmBXWVRpk1m4CvJmL3CO8jzmNX
hRYyW2zSR3dxsrO4nRL+Jipl6pBEpGiw0t/urQo9Pts4zNQu9b7DAAxqao/kf7xO
JBzlVIWyWWeeX6EqxiBDyeo3HH+E8rT8Zw8XKsJlqmEAdXDoBsYO1VOAIERIpV0j
gxcCH5rZzjDxasKH5wnYFdjI1Z1JQqLFTWSfrig1fSkXcv7v7SbxvkpQN0djy+WB
slnm/cZ9fYL+C8BUMOeXR0GBsY1gKyAVlQ9MejWCodI6QrvqEx4=
=5cmn
-----END PGP SIGNATURE-----


_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ