APPLE-SA-12-11-2024-7 tvOS 18.2
APPLE-SA-12-11-2024-7 tvOS 18.2
- Subject: APPLE-SA-12-11-2024-7 tvOS 18.2
- From: Apple Product Security via Security-announce <email@hidden>
- Date: Wed, 11 Dec 2024 16:39:22 -0700
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
APPLE-SA-12-11-2024-7 tvOS 18.2
tvOS 18.2 addresses the following issues.
Information about the security content is also available at
https://support.apple.com/121844.
Apple maintains a Security Releases page at
https://support.apple.com/100100 which lists recent
software updates with security advisories.
AppleMobileFileIntegrity
Available for: Apple TV HD and Apple TV 4K (all models)
Impact: A malicious app may be able to access private information
Description: The issue was addressed with improved checks.
CVE-2024-54526: Mickey Jin (@patch1t), Arsenii Kostromin (0x3c3e)
AppleMobileFileIntegrity
Available for: Apple TV HD and Apple TV 4K (all models)
Impact: An app may be able to access sensitive user data
Description: This issue was addressed with improved checks.
CVE-2024-54527: Mickey Jin (@patch1t)
Crash Reporter
Available for: Apple TV HD and Apple TV 4K (all models)
Impact: An app may be able to access sensitive user data
Description: A permissions issue was addressed with additional
restrictions.
CVE-2024-54513: an anonymous researcher
FontParser
Available for: Apple TV HD and Apple TV 4K (all models)
Impact: Processing a maliciously crafted font may result in the
disclosure of process memory
Description: The issue was addressed with improved checks.
CVE-2024-54486: Hossein Lotfi (@hosselot) of Trend Micro Zero Day
Initiative
ImageIO
Available for: Apple TV HD and Apple TV 4K (all models)
Impact: Processing a maliciously crafted image may result in disclosure
of process memory
Description: The issue was addressed with improved checks.
CVE-2024-54500: Junsung Lee working with Trend Micro Zero Day Initiative
Kernel
Available for: Apple TV HD and Apple TV 4K (all models)
Impact: An attacker may be able to create a read-only memory mapping
that can be written to
Description: A race condition was addressed with additional validation.
CVE-2024-54494: sohybbyk
Kernel
Available for: Apple TV HD and Apple TV 4K (all models)
Impact: An app may be able to leak sensitive kernel state
Description: A race condition was addressed with improved locking.
CVE-2024-54510: Joseph Ravichandran (@0xjprx) of MIT CSAIL
libexpat
Available for: Apple TV HD and Apple TV 4K (all models)
Impact: A remote attacker may cause an unexpected app termination or
arbitrary code execution
Description: This is a vulnerability in open source code and Apple
Software is among the affected projects. The CVE-ID was assigned by a
third party. Learn more about the issue and CVE-ID at cve.org.
CVE-2024-45490
libxpc
Available for: Apple TV HD and Apple TV 4K (all models)
Impact: An app may be able to break out of its sandbox
Description: The issue was addressed with improved checks.
CVE-2024-54514: an anonymous researcher
libxpc
Available for: Apple TV HD and Apple TV 4K (all models)
Impact: An app may be able to gain elevated privileges
Description: A logic issue was addressed with improved checks.
CVE-2024-44225: 风沐云烟(@binary_fmyy)
SceneKit
Available for: Apple TV HD and Apple TV 4K (all models)
Impact: Processing a maliciously crafted file may lead to a denial of
service
Description: The issue was addressed with improved checks.
CVE-2024-54501: Michael DePlante (@izobashi) of Trend Micro's Zero Day
Initiative
WebKit
Available for: Apple TV HD and Apple TV 4K (all models)
Impact: Processing maliciously crafted web content may lead to an
unexpected process crash
Description: The issue was addressed with improved checks.
WebKit Bugzilla: 278497
CVE-2024-54479: Seunghyun Lee
WebKit Bugzilla: 281912
CVE-2024-54502: Brendon Tiszka of Google Project Zero
WebKit
Available for: Apple TV HD and Apple TV 4K (all models)
Impact: Processing maliciously crafted web content may lead to an
unexpected process crash
Description: The issue was addressed with improved memory handling.
WebKit Bugzilla: 282180
CVE-2024-54508: linjy of HKUS3Lab and chluo of WHUSecLab, Xiangwei Zhang
of Tencent Security YUNDING LAB
WebKit
Available for: Apple TV HD and Apple TV 4K (all models)
Impact: Processing maliciously crafted web content may lead to memory
corruption
Description: A type confusion issue was addressed with improved memory
handling.
WebKit Bugzilla: 282661
CVE-2024-54505: Gary Kwong
WebKit
Available for: Apple TV HD and Apple TV 4K (all models)
Impact: Processing maliciously crafted web content may lead to memory
corruption
Description: The issue was addressed with improved memory handling.
WebKit Bugzilla: 277967
CVE-2024-54534: Tashita Software Security
Additional recognition
FaceTime
We would like to acknowledge 椰椰 for their assistance.
Proximity
We would like to acknowledge Junming C. (@Chapoly1305) and Prof. Qiang
Zeng of George Mason University for their assistance.
Swift
We would like to acknowledge Marc Schoenefeld, Dr. rer. nat. for their
assistance.
WebKit
We would like to acknowledge Hafiizh for their assistance.
Apple TV will periodically check for software updates. Alternatively,
you may manually check for software updates by selecting
"Settings -> System -> Software Update -> Update Software."
To check the current version of software, select
"Settings -> General → About.“
All information is also posted on the Apple Security Releases
web site: https://support.apple.com/100100.
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----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=gAsP
-----END PGP SIGNATURE-----
_______________________________________________
Do not post admin requests to the list. They will be ignored.
Security-announce mailing list (email@hidden)
Help/Unsubscribe/Update your Subscription:
This email sent to email@hidden