Last active
August 29, 2015 14:09
-
-
Save englishm/f6fa36854e568fb8638d to your computer and use it in GitHub Desktop.
APPLE-SA-2014-11-17-*
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
From: Apple Product Security <[email protected]> | |
Date: Mon, 17 Nov 2014 11:22:23 -0800 | |
Subject: APPLE-SA-2014-11-17-1 iOS 8.1.1 | |
To: [email protected] | |
-----BEGIN PGP SIGNED MESSAGE----- | |
Hash: SHA1 | |
APPLE-SA-2014-11-17-1 iOS 8.1.1 | |
iOS 8.1.1 is now available and addresses the following: | |
CFNetwork | |
Available for: iPhone 4s and later, | |
iPod touch (5th generation) and later, iPad 2 and later | |
Impact: Website cache may not be fully cleared after leaving private | |
browsing | |
Description: A privacy issue existed where browsing data could | |
remain in the cache after leaving private browsing. This issue was | |
addressed through a change in caching behavior. | |
CVE-ID | |
CVE-2014-4460 | |
dyld | |
Available for: iPhone 4s and later, | |
iPod touch (5th generation) and later, iPad 2 and later | |
Impact: A local user may be able to execute unsigned code | |
Description: A state management issue existed in the handling of | |
Mach-O executable files with overlapping segments. This issue was | |
addressed through improved validation of segment sizes. | |
CVE-ID | |
CVE-2014-4455 : @PanguTeam | |
Kernel | |
Available for: iPhone 4s and later, | |
iPod touch (5th generation) and later, iPad 2 and later | |
Impact: A malicious application may be able to execute arbitrary | |
code with system privileges | |
Description: A validation issue existed in the handling of certain | |
metadata fields of IOSharedDataQueue objects. This issue was | |
addressed through relocation of the metadata. | |
CVE-ID | |
CVE-2014-4461 : @PanguTeam | |
Lock Screen | |
Available for: iPhone 4s and later, | |
iPod touch (5th generation) and later, iPad 2 and later | |
Impact: An attacker in possession of a device may exceed the maximum | |
number of failed passcode attempts | |
Description: In some circumstances, the failed passcode attempt | |
limit was not enforced. This issue was addressed through additional | |
enforcement of this limit. | |
CVE-ID | |
CVE-2014-4451 : Stuart Ryan of University of Technology, Sydney | |
Lock Screen | |
Available for: iPhone 4s and later, | |
iPod touch (5th generation) and later, iPad 2 and later | |
Impact: A person with physical access to the phone may be able to | |
access photos in the Photo Library | |
Description: The Leave a Message option in FaceTime may have allowed | |
viewing and sending photos from the device. This issue was addressed | |
through improved state management. | |
CVE-ID | |
CVE-2014-4463 | |
Sandbox Profiles | |
Available for: iPhone 4s and later, | |
iPod touch (5th generation) and later, iPad 2 and later | |
Impact: A malicious application may be able to launch arbitrary | |
binaries on a trusted device | |
Description: A permissions issue existed with the debugging | |
functionality for iOS that allowed the spawning of applications on | |
trusted devices that were not being debugged. This was addressed by | |
changes to debugserver's sandbox. | |
CVE-ID | |
CVE-2014-4457 : @PanguTeam | |
Spotlight | |
Available for: iPhone 4s and later, | |
iPod touch (5th generation) and later, iPad 2 and later | |
Impact: Unnecessary information is included as part of the initial | |
connection between Spotlight or Safari and the Spotlight Suggestions | |
servers | |
Description: The initial connection made by Spotlight or Safari to | |
the Spotlight Suggestions servers included a user's approximate | |
location before a user entered a query. This issue was addressed by | |
removing this information from the initial connection and only | |
sending the user's approximate location as part of queries. | |
CVE-ID | |
CVE-2014-4453 : Ashkan Soltani | |
WebKit | |
Available for: iPhone 4s and later, | |
iPod touch (5th generation) and later, iPad 2 and later | |
Impact: Visiting a maliciously crafted website may lead to an | |
unexpected application termination or arbitrary code execution | |
Description: Multiple memory corruption issues existed in WebKit. | |
These issues were addressed through improved memory handling. | |
CVE-ID | |
CVE-2014-4452 | |
CVE-2014-4462 | |
Installation note: | |
This update is available through iTunes and Software Update on your | |
iOS device, and will not appear in your computer's Software Update | |
application, or in the Apple Downloads site. Make sure you have an | |
Internet connection and have installed the latest version of iTunes | |
from www.apple.com/itunes/ | |
iTunes and Software Update on the device will automatically check | |
Apple's update server on its weekly schedule. When an update is | |
detected, it is downloaded and the option to be installed is | |
presented to the user when the iOS device is docked. We recommend | |
applying the update immediately if possible. Selecting Don't Install | |
will present the option the next time you connect your iOS device. | |
The automatic update process may take up to a week depending on the | |
day that iTunes or the device checks for updates. You may manually | |
obtain the update via the Check for Updates button within iTunes, or | |
the Software Update on your device. | |
To check that the iPhone, iPod touch, or iPad has been updated: | |
* Navigate to Settings | |
* Select General | |
* Select About. The version after applying this update | |
will be "8.1.1". | |
Information will also be posted to the Apple Security Updates | |
web site: http://support.apple.com/kb/HT1222 | |
This message is signed with Apple's Product Security PGP key, | |
and details are available at: | |
https://www.apple.com/support/security/pgp/ | |
-----BEGIN PGP SIGNATURE----- | |
Version: GnuPG/MacGPG2 v2.0.22 (Darwin) | |
Comment: GPGTools - http://gpgtools.org | |
iQIcBAEBAgAGBQJUajYFAAoJEBcWfLTuOo7tGxsP/RccLDIt/LMluE7bcG9NSz4w | |
tw8AHhkfiDZ+T/nnhqAiS2RQ2cgSfMg8KVzCtbrtXrEgebFTUVlos1vIjMSEkqgp | |
GmSDFn64vZIExVo8w9iTLG/AdW0sERz3h2xVSEr/154AG2SHnL1+nY5abHHycTIG | |
Uuo60+t2OVPtREIcrffmwj6hsYAX1dLAI0QV7PdvjpCc82Snf+yJZCFyjQ23AkQn | |
P9NElRnK+pbhqqnfZXKO3Hbgf5IkuzeSl4Rwrj8nehu+hcEp32a8zH2wbbzDsFTO | |
AyM02SAGLmBM30QcoJYK/s0lCGJBbr9rM5+9dUH6KXc8q/OTLJ0YETdHqwsO29cf | |
XEl5uQT4IHGjlij2f/xYsa0OXbLfyXNeaT5YGlUSIUKNFXRhD6rPccL5V5Ktjnac | |
JxOv0og5L4OBtPykc0XhmRqTIkEC4Cf3RmewA+b8ivsp/LuPjYsdfN1tZ8MXa1a8 | |
C7hhUQSSSTtA3v7oO/LpU8Qw7kV79SkeQcYYTP07QI87cU2HHDejBHCfGjK9cz65 | |
Uf4Sa/leCT0JyQYnx0XOafFTzxIJ2641HtTjuQ3sTKungkE5CR/KyVk2Wul3YqcA | |
Meo//heYRLNa1XANfzV70TcsnQ2lcirzOqiufC+jljsfkQtlAXWim9H9BCc4102b | |
ugp50lE7/p+CbwYvqaZg | |
=x/RM | |
-----END PGP SIGNATURE----- |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
From: Apple Product Security <[email protected]> | |
Date: Mon, 17 Nov 2014 11:22:39 -0800 | |
Subject: APPLE-SA-2014-11-17-2 OS X Yosemite 10.10.1 | |
To: [email protected] | |
-----BEGIN PGP SIGNED MESSAGE----- | |
Hash: SHA1 | |
APPLE-SA-2014-11-17-2 OS X Yosemite 10.10.1 | |
OS X 10.10.1 is now available and addresses the following: | |
CFNetwork | |
Available for: OS X Yosemite v10.10 | |
Impact: Website cache may not be fully cleared after leaving private | |
browsing | |
Description: A privacy issue existed where browsing data could | |
remain in the cache after leaving private browsing. This issue was | |
addressed through a change in caching behavior. | |
CVE-ID | |
CVE-2014-4460 | |
Spotlight | |
Available for: OS X Yosemite v10.10 | |
Impact: Unnecessary information is included as part of the initial | |
connection between Spotlight or Safari and the Spotlight Suggestions | |
servers | |
Description: The initial connection made by Spotlight or Safari to | |
the Spotlight Suggestions servers included a user's approximate | |
location before a user entered a query. This issue was addressed by | |
removing this information from the initial connection and only | |
sending the user's approximate location as part of queries. | |
CVE-ID | |
CVE-2014-4453 : Ashkan Soltani | |
System Profiler About This Mac | |
Available for: OS X Yosemite v10.10 | |
Impact: Unnecessary information is included as part of a connection | |
to Apple to determine the system model | |
Description: The request made by About This Mac to determine the | |
model of the system and direct users to the correct help resources | |
included unnecessary cookies. This issue was addressed by removing | |
cookies from the connection. | |
CVE-ID | |
CVE-2014-4458 : Landon Fuller of Plausible Labs | |
WebKit | |
Available for: OS X Yosemite v10.10 | |
Impact: Visiting a maliciously crafted website may lead to an | |
unexpected application termination or arbitrary code execution | |
Description: A use after free issue existed in the handling of page | |
objects. This issue was addressed through improved memory management. | |
CVE-ID | |
CVE-2014-4459 | |
OS X Yosemite 10.10.1 may be obtained from the Mac App Store. | |
Information will also be posted to the Apple Security Updates | |
web site: http://support.apple.com/kb/HT1222 | |
This message is signed with Apple's Product Security PGP key, | |
and details are available at: | |
https://www.apple.com/support/security/pgp/ | |
-----BEGIN PGP SIGNATURE----- | |
Version: GnuPG/MacGPG2 v2.0.22 (Darwin) | |
Comment: GPGTools - http://gpgtools.org | |
iQIcBAEBAgAGBQJUadzaAAoJEBcWfLTuOo7t+NEQAJ9Ol8jEbJjK9gX2vepXSgB/ | |
l4xfQIoD0dC5vGKquE+HJS0zH7sdmd9mK+Th439fy4z2PtjulQIKXDdP60CFsZcQ | |
oj7XU1TmWvZjCqWsr90fA61mIWsX9WjfbwKaN55ioLF2NOXBA1+AevqsosN/kj9m | |
OcfGnIhaAOmFtlveKywSwwep0TGMXMHmi7NjScdlJRdu1GQAlpkq0iqkMjzueoPI | |
zgZuC3xopuqMtaf686cAcgVo0FM8gX3Gj55MhDDy2bkl4/dj1+N5KBnaZGGQEaww | |
9FNtK0OUBzG9qpBRDMbuAihGn4FzhZa3/DIAjfr6t2h1xV5SSjH93wGbCl7Yp8jE | |
+Gi82WRf3DJ60ztGRvQZkiBpkC0pMretdBHXRAiSTWwiRuRYghENmY9vDWHthj3z | |
8HZWHxbcGLsDQQKUFzO4+v60LKs/LQ92nTNhuQyMeh4Jse3Qg8lUknthSEsw1UXd | |
GqOKlvKOEQP5JXir6VzjgppYThBAVKnCbzVXcxLUGgVxmk9L/HDhbnxS3rd2U4M0 | |
vAxgBt8/8sjDEdO7IM6AtmBlSGQrxQ4trkG3vmw75RVgwWvFQ1J7b588qtFiVu/N | |
KRTp3qMKRkZiakkinyZEv6zj6AKKa1CohlorI7tiD0rlOYbw1+n2gHi+1ahreO6f | |
VT75kTNto2qPitQC9I+6 | |
=9Emx | |
-----END PGP SIGNATURE----- |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
From: Apple Product Security <[email protected]> | |
Date: Mon, 17 Nov 2014 11:23:16 -0800 | |
Subject: APPLE-SA-2014-11-17-3 Apple TV 7.0.2 | |
To: [email protected] | |
-----BEGIN PGP SIGNED MESSAGE----- | |
Hash: SHA1 | |
APPLE-SA-2014-11-17-3 Apple TV 7.0.2 | |
Apple TV 7.0.2 is now available and addresses the following: | |
Apple TV | |
Available for: Apple TV 3rd generation and later | |
Impact: An attacker with a privileged network position may cause an | |
unexpected application termination or arbitrary code execution | |
Description: Multiple memory corruption issues existed in WebKit. | |
These issues were addressed through improved memory handling. | |
CVE-ID | |
CVE-2014-4452 | |
CVE-2014-4462 | |
Apple TV | |
Available for: Apple TV 3rd generation and later | |
Impact: A local user may be able to execute unsigned code | |
Description: A state management issue existed in the handling of | |
Mach-O executable files with overlapping segments. This issue was | |
addressed through improved validation of segment sizes. | |
CVE-ID | |
CVE-2014-4455 : @PanguTeam | |
Apple TV | |
Available for: Apple TV 3rd generation and later | |
Impact: A malicious application may be able to execute arbitrary | |
code with system privileges | |
Description: A validation issue existed in the handling of certain | |
metadata fields of IOSharedDataQueue objects. This issue was | |
addressed through relocation of the metadata. | |
CVE-ID | |
CVE-2014-4461 : @PanguTeam | |
Installation note: | |
Apple TV will periodically check for software updates. Alternatively, | |
you may manually check for software updates by selecting | |
"Settings -> General -> Update Software". | |
To check the current version of software, select | |
"Settings -> General -> About". | |
Information will also be posted to the Apple Security Updates | |
web site: https://support.apple.com/kb/HT1222 | |
This message is signed with Apple's Product Security PGP key, | |
and details are available at: | |
https://www.apple.com/support/security/pgp/ | |
-----BEGIN PGP SIGNATURE----- | |
Version: GnuPG/MacGPG2 v2.0.22 (Darwin) | |
Comment: GPGTools - http://gpgtools.org | |
iQIcBAEBAgAGBQJUajX6AAoJEBcWfLTuOo7to84QAJgIkijuRWbjIumNWZ4tyS2b | |
v5e0/hdDD5un60trk7sX16TXFw0z9a25uytvjHOvgnleMdLXVMhAj3V6RtLFX+6u | |
kohV5SiKlGK6m47vVNDT89eYV6UTpSU2BuYPsng+7K8QRUXcVxRZNCSMlRFNeQxF | |
lcWR/74xr/tMu4kvZfzFaYFrZqTGudnmjGxtfygNSY+/eHCxDLCVU3VnUaGPpGmd | |
kPAX5QyLsOTfhWePnqpsHqt4l+xZVzI2LOzBNNEpQ0Qif6qLzt4zx1PR2RcKAuKg | |
qJNBuK08tV8Hne0Sms8SeH8EM92buiPLoTxqvGO9xB68zXtnclFMzA+Z6XQ2GOik | |
19OXYAfVetiO/mN4Hg+2gB7hZ0Tw6EznOeujcZK3vC3zH6RgqzjevgA5Fas6T9lw | |
rEWzwailhUs6EOOpolT1OHMIogTXSAxpmO+CyrTwIYCwMWQmPDQyJfqAs5RjUU9d | |
X0tZxnom20oVTp3U2AkzNUUaQbC0oZgydBjfoNM412dCzsh3rF8IvA/GnM0fLdlR | |
pcxFO0q+fbqMcM9tTcdEJ+blgvOfyM77y72YSl6PkwsylRwRpC0DY7XqgUyERKqX | |
qZU+luMsZCWA47Y1BjYtG95xGrpmkKtPSnr7V4dqnsKGMK+Uh5Xa7pKdEVzdM3nD | |
DHp/ayEiwY577KD9XDFw | |
=kqc5 | |
-----END PGP SIGNATURE----- |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment