APPLE-SA-2016-10-24-5 watchOS 3.1
APPLE-SA-2016-10-24-5 watchOS 3.1
- Subject: APPLE-SA-2016-10-24-5 watchOS 3.1
- From: Apple Product Security <email@hidden>
- Date: Mon, 24 Oct 2016 12:18:42 -0700
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
APPLE-SA-2016-10-24-5 watchOS 3.1
watchOS 3.1 is now available and addresses the following:
CoreGraphics
Available for: All Apple Watch models
Impact: Viewing a maliciously crafted JPEG file may lead to arbitrary
code execution
Description: A memory corruption issue was addressed through improved
memory handling.
CVE-2016-4673: Marco Grassi (@marcograss) of KeenLab (@keen_lab),
Tencent
FontParser
Available for: All Apple Watch models
Impact: Parsing a maliciously crafted font may disclose sensitive
user information
Description: An out-of-bounds read was addressed through improved
bounds checking.
CVE-2016-4660: Ke Liu of Tencent's Xuanwu Lab
Kernel
Available for: All Apple Watch models
Impact: An application may be able to disclose kernel memory
Description: A validation issue was addressed through improved input
sanitization.
CVE-2016-4680: Max Bazaliy of Lookout and in7egral
libarchive
Available for: All Apple Watch models
Impact: A malicious archive may be able to overwrite arbitrary files
Description: An issue existed within the path validation logic for
symlinks. This issue was addressed through improved path
sanitization.
CVE-2016-4679: Omer Medan of enSilo Ltd
libxpc
Available for: All Apple Watch models
Impact: An application may be able to execute arbitrary code with
root privileges
Description: A logic issue was addressed through additional
restrictions.
CVE-2016-4675: Ian Beer of Google Project Zero
Sandbox Profiles
Available for: All Apple Watch models
Impact: An application may be able to retrieve metadata of photo
directories
Description: An access issue was addressed through additional sandbox
restrictions on third party applications.
CVE-2016-4664: Razvan Deaconescu, Mihai Chiroiu (University
POLITEHNICA of Bucharest); Luke Deshotels, William Enck (North
Carolina State University); Lucas Vincenzo Davi, Ahmad-Reza Sadeghi
(TU Darmstadt)
Sandbox Profiles
Available for: All Apple Watch models
Impact: An application may be able to retrieve metadata of audio
recording directories
Description: An access issue was addressed through additional sandbox
restrictions on third party applications.
CVE-2016-4665: Razvan Deaconescu, Mihai Chiroiu (University
POLITEHNICA of Bucharest); Luke Deshotels, William Enck (North
Carolina State University); Lucas Vincenzo Davi, Ahmad-Reza Sadeghi
(TU Darmstadt)
System Boot
Available for: All Apple Watch models
Impact: A local user may be able to cause an unexpected system
termination or arbitrary code execution in the kernel
Description: Multiple input validation issues existed in MIG
generated code. These issues were addressed through improved
validation.
CVE-2016-4669: Ian Beer of Google Project Zero
Installation note:
Instructions on how to update your Apple Watch software are
available at https://support.apple.com/kb/HT204641
To check the version on your Apple Watch, open the Apple Watch app
on your iPhone and select "My Watch > General > About".
Alternatively, on your watch, select "My Watch > General > About".
Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - https://gpgtools.org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=NsnX
-----END PGP SIGNATURE-----
_______________________________________________
Do not post admin requests to the list. They will be ignored.
Security-announce mailing list (email@hidden)
Help/Unsubscribe/Update your Subscription:
This email sent to email@hidden