lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-id: <4EB371A5-7B86-4CF7-AED0-37382F54D500@lists.apple.com> Date: Tue, 26 Jan 2021 13:05:32 -0800 From: Apple Product Security via Fulldisclosure <fulldisclosure@...lists.org> To: security-announce@...ts.apple.com Subject: [FD] APPLE-SA-2021-01-26-2 tvOS 14.4 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 APPLE-SA-2021-01-26-2 tvOS 14.4 tvOS 14.4 addresses the following issues. Information about the security content is also available at https://support.apple.com/HT212149. Kernel Available for: Apple TV 4K and Apple TV HD Impact: A malicious application may be able to elevate privileges. Apple is aware of a report that this issue may have been actively exploited. Description: A race condition was addressed with improved locking. CVE-2021-1782: an anonymous researcher Additional details available soon. Installation note: Apple TV will periodically check for software updates. Alternatively, you may manually check for software updates by selecting "Settings -> System -> Software Update -> Update Software." To check the current version of software, select "Settings -> General -> About." This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEbURczHs1TP07VIfuZcsbuWJ6jjAFAmAQb9YACgkQZcsbuWJ6 jjDLew/9FsUDL1jNIoHQQyOC/wHOvIy64zByYpECYiCiB96tWyCglq9KmxnICMXj KRSgwTahwfID8xA5Fmcse/zhZFGs69UFit75aFoDkelHfOUHAzyGwo0eT2ib1Z+/ 6zu5U5ITLRqJVpHIJfKV7RDF6+R29sj7HZUOqEriS9k+sObfqqPJOvN3XPhLdGqL SCbdj5/Z6gJVROJhJKAwGl6latKFBRbpwaRtpGtF0j3NoXGmbh/ou8ureuPWIrkV EhXiXSlzHwhXF4rM2zrWX6Z/S0wXSCKpmi5mPkMNe+MwCNb2wcxnG0DzjRn69PCy j/2RoidmjGn9YXv6jEArtRLwVwc6PtyzSP7bS0qLBx0DVKlXwlhUcPCOalVJPQO7 COnO6sGBjl4YzpDIeI359KECr9OUjUat2sXLRFASg2R/fOtzusf6Aty9fEtcPOAR A8j5IGU7erP932pkQYH7Jl3+/8VGRJL/OFzVgJe16ezgmtYifiXFCKR+S9Bc+U5q eNpT83isYcAab9OuGZ2L7LaMe18rQM4WRT4i/cGqzTNxRhp+UqnkkRC/4NScDV0Y +sTZkbQ+k8uzNI/RsRxyBXI+YQ4xdAsJcBkCOVQRoHKY2XY6bgpWw7EwbIVs0PQl +O2facEx65JEMeZMf5clOu5G+CShk+4RUjLI0FcDHPzKwu6BDOs= =txby -----END PGP SIGNATURE----- _______________________________________________ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists