[<prev] [next>] [day] [month] [year] [list]
Message-id: <7B10EFBA-49ED-4664-A4E0-28DF9E3B26F3@lists.apple.com>
Date: Fri, 12 Dec 2025 14:58:36 -0700
From: Apple Product Security via Fulldisclosure <fulldisclosure@...lists.org>
To: security-announce@...ts.apple.com
Subject: [FD] APPLE-SA-12-12-2025-6 tvOS 26.2
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
APPLE-SA-12-12-2025-6 tvOS 26.2
tvOS 26.2 addresses the following issues.
Information about the security content is also available at
https://support.apple.com/125889.
Apple maintains a Security Releases page at
https://support.apple.com/100100 which lists recent
software updates with security advisories.
AppleJPEG
Available for: Apple TV HD and Apple TV 4K (all models)
Impact: Processing a file may lead to memory corruption
Description: The issue was addressed with improved bounds checks.
CVE-2025-43539: Michael Reeves (@IntegralPilot)
curl
Available for: Apple TV HD and Apple TV 4K (all models)
Impact: Multiple issues in curl
Description: This is a vulnerability in open source code and Apple
Software is among the affected projects. The CVE-ID was assigned by a
third party. Learn more about the issue and CVE-ID at cve.org.
CVE-2024-7264
CVE-2025-9086
Foundation
Available for: Apple TV HD and Apple TV 4K (all models)
Impact: Processing malicious data may lead to unexpected app termination
Description: A memory corruption issue was addressed with improved
bounds checking.
CVE-2025-43532: Andrew Calvano and Lucas Pinheiro of Meta Product
Security
Icons
Available for: Apple TV HD and Apple TV 4K (all models)
Impact: An app may be able to identify what other apps a user has
installed
Description: A permissions issue was addressed with additional
restrictions.
CVE-2025-46279: Duy Trần (@khanhduytran0)
Kernel
Available for: Apple TV HD and Apple TV 4K (all models)
Impact: An app may be able to gain root privileges
Description: An integer overflow was addressed by adopting 64-bit
timestamps.
CVE-2025-46285: Kaitao Xie and Xiaolong Bai of Alibaba Group
Multi-Touch
Available for: Apple TV HD and Apple TV 4K (all models)
Impact: A malicious HID device may cause an unexpected process crash
Description: Multiple memory corruption issues were addressed with
improved input validation.
CVE-2025-43533: Google Threat Analysis Group
WebKit
Available for: Apple TV HD and Apple TV 4K (all models)
Impact: Processing maliciously crafted web content may lead to an
unexpected process crash
Description: A race condition was addressed with improved state
handling.
WebKit Bugzilla: 301940
CVE-2025-43531: Phil Pizlo of Epic Games
WebKit
Available for: Apple TV HD and Apple TV 4K (all models)
Impact: Processing maliciously crafted web content may lead to arbitrary
code execution. Apple is aware of a report that this issue may have been
exploited in an extremely sophisticated attack against specific targeted
individuals on versions of iOS before iOS 26. CVE-2025-14174 was also
issued in response to this report.
Description: A use-after-free issue was addressed with improved memory
management.
WebKit Bugzilla: 302502
CVE-2025-43529: Google Threat Analysis Group
WebKit
Available for: Apple TV HD and Apple TV 4K (all models)
Impact: Processing maliciously crafted web content may lead to memory
corruption. Apple is aware of a report that this issue may have been
exploited in an extremely sophisticated attack against specific targeted
individuals on versions of iOS before iOS 26. CVE-2025-43529 was also
issued in response to this report.
Description: A memory corruption issue was addressed with improved
validation.
WebKit Bugzilla: 303614
CVE-2025-14174: Apple and Google Threat Analysis Group
Additional recognition
AppleMobileFileIntegrity
We would like to acknowledge an anonymous researcher for their
assistance.
AppSandbox
We would like to acknowledge Mickey Jin (@patch1t) for their assistance.
Core Services
We would like to acknowledge Golden Helm Securities for their
assistance.
WebKit
We would like to acknowledge Geva Nurgandi Syahputra (gevakun) for their
assistance.
Apple TV will periodically check for software updates. Alternatively,
you may manually check for software updates by selecting
"Settings -> System -> Software Update -> Update Software."
To check the current version of software, select
"Settings -> General -> About."
All information is also posted on the Apple Security Releases
web site: https://support.apple.com/100100.
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----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=3IJt
-----END PGP SIGNATURE-----
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: https://seclists.org/fulldisclosure/
Powered by blists - more mailing lists