-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
APPLE-SA-2011-10-12-4 Safari 5.1.1
Safari 5.1.1 is now available and addresses the following:
Safari
Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8,
OS X Lion v10.7.2, OS X Lion Server v10.7.2, Windows 7, Vista,
XP SP2 or later
Impact: Vi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
APPLE-SA-2011-10-26-1 QuickTime 7.7.1
QuickTime 7.7.1 is now available and addresses the following:
QuickTime
Available for: Windows 7, Vista, XP SP2 or later
Impact: Viewing a maliciously crafted movie file may lead to an
unexpected application te
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
APPLE-SA-2011-11-08-1 Java for Mac OS X 10.7 Update 1 and Java for Mac
OS X 10.6 Update 6
Java for Mac OS X 10.7 Update 1 and Java for Mac OS X 10.6 Update 6
are now available and address the following:
Java
Available for: Mac OS X v10.6.8, Mac OS X
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
APPLE-SA-2011-11-10-1 iOS 5.0.1 Software Update
iOS 5.0.1 Software Update is now available and addresses the
following:
CFNetwork
Available for: iOS 3.0 through 5.0 for iPhone 3GS,
iPhone 4 and iPhone 4S,
iOS 3.1 through 5.0 for iPod touch (3rd gene
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
APPLE-SA-2011-11-10-2 Time Capsule and AirPort Base Station (802.11n)
Firmware 7.6
Time Capsule and AirPort Base Station (802.11n) Firmware 7.6 is now
available and addresses the following:
Available for: AirPort Extreme Base Station with 802.11n,
A
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
APPLE-SA-2011-11-14-1 iTunes 10.5.1
iTunes 10.5.1 is now available and addresses the following:
iTunes
Available for: Mac OS X v10.5 or later, Windows 7, Vista,
XP SP2 or later
Impact: A man-in-the-middle attacker may offer software that appears
to
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
APPLE-SA-2012-02-01-1 OS X Lion v10.7.3 and Security Update 2012-001
OS X Lion v10.7.3 and Security Update 2012-001 is now available and
addresses the following:
Address Book
Available for: OS X Lion v10.7 to v10.7.2,
OS X Lion Server v10.7 to v10.7
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
APPLE-SA-2012-03-07-1 iTunes 10.6
iTunes 10.6 is now available and addresses the following:
WebKit
Available for: Windows 7, Vista, XP SP2 or later
Impact: A man-in-the-middle attack while browsing the iTunes Store
via iTunes may lead to an unexpec
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
APPLE-SA-2012-03-07-2 iOS 5.1 Software Update
iOS 5.1 Software Update is now available and addresses the following:
CFNetwork
Available for: iPhone 3GS, iPhone 4, iPhone 4S,
iPod touch (3rd generation) and later, iPad, iPad 2
Impact: Visiting a mal
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
APPLE-SA-2012-03-07-3 Apple TV 5.0
Apple TV 5.0 is now available and addresses the following:
Apple TV
Available for: Apple TV (2nd generation)
Impact: Applications that use the libresolv library may be
vulnerable to an unexpected application termi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
APPLE-SA-2012-03-12-1 Safari 5.1.4
Safari 5.1.4 is now available and addresses the following:
Safari
Available for: Windows 7, Vista, XP SP2 or later
Impact: Look-alike characters in a URL could be used to masquerade a
website
Description: The Int
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
APPLE-SA-2012-04-03-1 Java for OS X 2012-001 and
Java for Mac OS X 10.6 Update 7
Java for OS X 2012-001 and Java for Mac OS X 10.6 Update 7 is now
available and addresses the following:
Java
Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8,
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
APPLE-SA-2012-04-12-1 Java for OS X 2012-003 and
Java for Mac OS X 10.6 Update 8
Java for OS X 2012-003 and Java for Mac OS X 10.6 Update 8 is now
available and addresses the following:
Java
Available for: OS X Lion v10.7.3, OS X Lion Server v10.7.3
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
APPLE-SA-2012-04-13-1 Flashback malware removal tool
Flashback malware removal tool is now available and addresses the
following:
Malware removal
Available for: OS X Lion v10.7 or later without Java installed
Impact: A Flashback malware removal too
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
APPLE-SA-2012-05-07-1 iOS 5.1.1 Software Update
iOS 5.1.1 Software Update is now available and addresses the
following:
Safari
Available for: iPhone 3GS, iPhone 4, iPhone 4S,
iPod touch (3rd generation) and later, iPad, iPad 2
Impact: A maliciously
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
APPLE-SA-2012-05-09-1 OS X Lion v10.7.4 and Security Update 2012-002
OS X Lion v10.7.4 and Security Update 2012-002 is now available and
addresses the following:
Login Window
Available for: OS X Lion v10.7.3, OS X Lion Server v10.7.3
Impact: Remote
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
APPLE-SA-2012-05-09-2 Safari 5.1.7
Safari 5.1.7 is now available and addresses the following:
WebKit
Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8,
OS X Lion v10.7.4, OS X Lion Server v10.7.4, Windows 7, Vista,
XP SP2 or later
Impact: Vi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
APPLE-SA-2012-05-14-1 Flashback Removal Security Update
Flashback Removal Security Update is now available and addresses the
following:
Malware removal
Available for: Mac OS X v10.5 to v10.5.8
Impact: A Flashback malware removal tool will be run
De
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
APPLE-SA-2012-05-14-2 Leopard Security Update 2012-003
Leopard Security Update 2012-003 is now available and addresses the
following:
Internet plug-ins
Available for: Mac OS X v10.5 to 10.5.8 Intel
Impact: Out-of-date versions of Adobe Flash Player
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
APPLE-SA-2012-05-15-1 QuickTime 7.7.2
QuickTime 7.7.2 is now available and addresses the following:
QuickTime
Available for: Windows 7, Vista, XP SP2 or later
Impact: Visiting a maliciously crafted website may lead to an
unexpected application term
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
APPLE-SA-2012-06-11-1 iTunes 10.6.3
iTunes 10.6.3 is now available and addresses the following:
iTunes
Available for: Mac OS X v10.5 or later, Windows 7, Vista,
XP SP2 or later
Impact: Importing a maliciously crafted .m3u playlist may lead to an
un
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
APPLE-SA-2012-06-12-1 Java for OS X 2012-004 and Java for
Mac OS X 10.6 Update 9
Java for OS X 2012-004 and Java for Mac OS X 10.6 Update 9 is now
available and addresses the following:
Java
Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8,
-3966 : Aki Helin of OUSPG
CVE-2011-3968 : Arthur Gerkis
CVE-2011-3969 : Arthur Gerkis
CVE-2011-3971 : Arthur Gerkis
CVE-2012-0682 : Apple Product Security
CVE-2012-0683 : Dave Mandelin of Mozilla
CVE-2012-1520 : Martin Barbella of the Google Chrome Security Team
using AddressSanitizer, Jose A. Vazq
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
APPLE-SA-2012-07-25-2 Xcode 4.4
Xcode 4.4 is now available and addresses the following:
neon
Available for: OS X Lion v10.7.4 and later
Impact: An attacker may be able to decrypt data protected by SSL
Description: There are known attacks on the co
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
APPLE-SA-2012-08-20-1 Apple Remote Desktop 3.6.1
Apple Remote Desktop 3.6.1 is now available and addresses the
following:
Apple Remote Desktop
Available for: Apple Remote Desktop 3.0 or later
Impact: Connecting to a third-party VNC server with "Enc
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
APPLE-SA-2012-09-05-1 Java for OS X 2012-005 and
Java for Mac OS X 10.6 Update 10
Java for OS X 2012-005 and Java for Mac OS X 10.6 Update 10 are now
available and address the following:
Java
Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8,
aubiz
CVE-2011-3913 : Arthur Gerkis
CVE-2011-3924 : Arthur Gerkis
CVE-2011-3926 : Arthur Gerkis
CVE-2011-3958 : miaubiz
CVE-2011-3966 : Aki Helin of OUSPG
CVE-2011-3968 : Arthur Gerkis
CVE-2011-3969 : Arthur Gerkis
CVE-2011-3971 : Arthur Gerkis
CVE-2012-0682 : Apple Product Security
CVE-2012-0683 :
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
APPLE-SA-2012-09-17-1 Apple Remote Desktop 3.5.3
Apple Remote Desktop 3.5.3 is now available and addresses the
following:
Apple Remote Desktop
Available for: Apple Remote Desktop 3.0 or later
Impact: Connecting to a third-party VNC server with "Enc
Gerkis
CVE-2011-3958 : miaubiz
CVE-2011-3966 : Aki Helin of OUSPG
CVE-2011-3968 : Arthur Gerkis
CVE-2011-3969 : Arthur Gerkis
CVE-2011-3971 : Arthur Gerkis
CVE-2012-0682 : Apple Product Security
CVE-2012-0683 : Dave Mandelin of Mozilla
CVE-2012-1520 : Martin Barbella of the Google Chrome Security T
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
APPLE-SA-2012-09-19-2 OS X Mountain Lion v10.8.2, OS X Lion v10.7.5 and
Security Update 2012-004
OS X Mountain Lion v10.8.2, OS X Lion v10.7.5 and Security Update
2012-004 are now available and address the following:
Apache
Available for: Mac OS X 1
iaubiz
CVE-2012-2818 : miaubiz
CVE-2012-2829 : miaubiz
CVE-2012-2831 : miaubiz
CVE-2012-2842 : miaubiz
CVE-2012-2843 : miaubiz
CVE-2012-3598 : Apple Product Security
CVE-2012-3601 : Martin Barbella of the Google Chrome Security Team
using AddressSanitizer
CVE-2012-3602 : miaubiz
CVE-2012-3606
ssues were addressed through improved memory
handling.
CVE-ID
CVE-2012-0682 : Apple Product Security
CVE-2012-0683 : Dave Mandelin of Mozilla
CVE-2012-3589 : Dave Mandelin of Mozilla
CVE-2012-3590 : Apple Product Security
CVE-2012-3591 : Apple Product Security
CVE-2012-3592 : Apple Product Security
C
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
APPLE-SA-2012-10-16-1 Java for OS X 2012-006 and
Java for Mac OS X 10.6 Update 11
Java for OS X 2012-006 and Java for Mac OS X 10.6 Update 11 are now
available and address the following:
Java
Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8,
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
APPLE-SA-2012-11-01-1 iOS 6.0.1
iOS 6.0.1 is now available and addresses the following:
Kernel
Available for: iPhone 3GS and later,
iPod touch (4th generation) and later, iPad 2 and later
Impact: Maliciously crafted or compromised iOS applications
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
APPLE-SA-2012-11-01-2 Safari 6.0.2
Safari 6.0.2 is now available and addresses the following:
WebKit
Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5,
OS X Mountain Lion v10.8.2
Impact: Visiting a maliciously crafted website may lead to a
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
APPLE-SA-2012-11-07-1 QuickTime 7.7.3
QuickTime 7.7.3 is now available and addresses the following:
QuickTime
Available for: Windows 7, Vista, XP SP2 or later
Impact: Viewing a maliciously crafted PICT file may lead to an
unexpected application te
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
APPLE-SA-2012-11-29-1 Apple TV 5.1.1
Apple TV 5.1.1 is now available and addresses the following:
Apple TV
Available for: Apple TV 2nd generation and later
Impact: Compromised applications may be able to determine addresses
in the kernel
Descriptio
m
CVE-2013-0954 : Dominic Cooney of Google and Martin Barbella of the
Google Chrome Security Team
CVE-2013-0955 : Apple
CVE-2013-0956 : Apple Product Security
CVE-2013-0958 : Abhishek Arya (Inferno) of the Google Chrome Security
Team
CVE-2013-0959 : Abhishek Arya (Inferno) of the Google Chrome Sec
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
APPLE-SA-2013-01-28-2 Apple TV 5.2
Apple TV 5.2 is now available and addresses the following:
Apple TV
Available for: Apple TV 2nd generation and later
Impact: A user-mode process may be able to access the first page of
kernel memory
Description:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
APPLE-SA-2013-02-01-1 Java for Mac OS X v10.6 Update 12
Java for Mac OS X v10.6 Update 12 is now available and addresses the
following:
Java
Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8
Impact: Multiple vulnerabilities in Java 1.6.0_37
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
APPLE-SA-2013-02-04-1 OS X Server v2.2.1
OS X Server v2.2.1 is now available and addresses the following:
Profile Manager
Available for: OS X Mountain Lion v10.8 or later
Impact: A remote attacker may be able to cause arbitrary code
execution
Descr
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
APPLE-SA-2013-02-19-1 Java for OS X 2013-001 and Mac OS X v10.6
Update 13
Java for OS X 2013-001 and Mac OS X v10.6 Update 13 is now available
and addresses the following:
Java
Available for: OS X Lion v10.7 or later,
OS X Lion Server v10.7 or later
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
APPLE-SA-2013-03-04-1 Java for OS X 2013-002 and Mac OS X v10.6
Update 14
Java for OS X 2013-002 and Mac OS X v10.6 Update 14 are now available
and address the following:
Java
Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8,
OS X Lion v10.7
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
APPLE-SA-2013-03-14-1 OS X Mountain Lion v10.8.3 and Security Update
2013-001
OS X Mountain Lion v10.8.3 and Security Update 2013-001 is now
available and addresses the following:
Apache
Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8,
OS X L
: Abhishek Arya (Inferno) of the Google Chrome Security
Team
CVE-2013-0954 : Dominic Cooney of Google and Martin Barbella of the
Google Chrome Security Team
CVE-2013-0955 : Apple
CVE-2013-0956 : Apple Product Security
CVE-2013-0958 : Abhishek Arya (Inferno) of the Google Chrome Security
Team
CVE-2013-0959
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
APPLE-SA-2013-03-19-1 iOS 6.1.3
iOS 6.1.3 is now available and addresses the following:
dyld
Available for: iPhone 3GS and later,
iPod touch (4th generation) and later, iPad 2 and later
Impact: A local user may be able to execute unsigned code
Desc
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
APPLE-SA-2013-03-19-2 Apple TV 5.2.1
Apple TV 5.2.1 is now available and addresses the following:
Apple TV
Available for: Apple TV 2nd generation and later
Impact: A local user may be able to execute unsigned code
Description: A state management i
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
APPLE-SA-2013-04-16-1 Safari 6.0.4
Safari 6.0.4 is now available and addresses the following:
WebKit
Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5,
OS X Mountain Lion v10.8.3
Impact: Visiting a maliciously crafted website may lead to a
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
APPLE-SA-2013-04-16-2 Java for OS X 2013-003 and
Mac OS X v10.6 Update 15
Java for OS X 2013-003 and Mac OS X v10.6 Update 15 are now available
and address the following:
Java
Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8,
OS X Lion v10.7
y
Team
CVE-2013-0953 : Abhishek Arya (Inferno) of the Google Chrome Security
Team
CVE-2013-0954 : Dominic Cooney of Google and Martin Barbella of the
Google Chrome Security Team
CVE-2013-0955 : Apple
CVE-2013-0956 : Apple Product Security
CVE-2013-0958 : Abhishek Arya (Inferno) of the Google Chrome Se
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
APPLE-SA-2013-05-22-1 QuickTime 7.7.4
QuickTime 7.7.4 is now available and addresses the following:
QuickTime
Available for: Windows 7, Vista, XP SP2 or later
Impact: Opening a maliciously crafted TeXML file may lead to an
unexpected application te
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
APPLE-SA-2013-06-04-2 Safari 6.0.5
Safari 6.0.5 is now available and addresses the following:
WebKit
Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5,
OS X Mountain Lion v10.8.3
Impact: Visiting a maliciously crafted website may lead to a
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
APPLE-SA-2013-06-04-1 OS X Mountain Lion v10.8.4 and Security Update
2013-002
OS X Mountain Lion v10.8.4 and Security Update 2013-002 is now
available and addresses the following:
CFNetwork
Available for: OS X Mountain Lion v10.8 to v10.8.3
Impact:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
APPLE-SA-2013-06-18-1 Java for OS X 2013-004 and
Mac OS X v10.6 Update 16
Java for OS X 2013-004 and Mac OS X v10.6 Update 16 is now available
and addresses the following:
Java
Available for: Mac OS X v10.6.8, Mac OS X Server v10.6.8,
OS X Lion v10.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
APPLE-SA-2013-07-02-1 Security Update 2013-003
Security Update 2013-003 is now available and addresses the
following:
QuickTime
Available for: Mac OS X 10.6.8, Mac OS X Server 10.6.8,
OS X Lion v10.7.5, OS X Lion Server v10.7.5,
OS X Mountain Lion v
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
APPLE-SA-2015-06-30-3 Mac EFI Security Update 2015-001
Mac EFI Security Update 2015-001 is now available and addresses the
following:
EFI
Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5
Impact: A malicious application with root
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
APPLE-SA-2015-06-30-5 QuickTime 7.7.7
QuickTime 7.7.7 is now available and addresses the following:
QT Media Foundation
Available for: Windows 7 and Windows Vista
Impact: Processing a maliciously crafted file may lead to an
unexpected application
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
APPLE-SA-2015-06-30-6 iTunes 12.2
iTunes 12.2 is now available and addresses the following:
WebKit
Available for: Windows 8 and Windows 7
Impact: A man-in-the-middle attack while browsing the iTunes Store
via iTunes may lead to an unexpected appl
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
APPLE-SA-2015-08-13-1 Safari 8.0.8, Safari 7.1.8, and Safari 6.2.8
Safari 8.0.8, Safari 7.1.8, and Safari 6.2.8 is now available and
addresses the following:
Safari Application
Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5,
an
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
APPLE-SA-2015-08-13-3 iOS 8.4.1
iOS 8.4.1 is now available and addresses the following:
AppleFileConduit
Available for: iPhone 4s and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: A maliciously crafted afc command may all
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
APPLE-SA-2015-08-13-2 OS X Yosemite v10.10.5 and Security Update
2015-006
OS X Yosemite v10.10.5 and Security Update 2015-006 is now available
and addresses the following:
apache
Available for: OS X Mavericks v10.9.5,
OS X Yosemite v10.10 to v10.1
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
APPLE-SA-2015-08-13-4 OS X Server v4.1.5
OS X Server v4.1.5 is now available and addresses the following:
BIND
Available for: OS X Yosemite v10.10.5 or later
Impact: A remote attacker may be able to cause a denial of service
Description: An asse
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
APPLE-SA-2015-08-20-1 QuickTime 7.7.8
QuickTime 7.7.8 is now available and addresses the following:
QuickTime
Available for: Windows 7 and Windows Vista
Impact: Processing a maliciously crafted file may lead to an
unexpected application termination
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
APPLE-SA-2015-09-16-1 iOS 9
iOS 9 is now available and addresses the following:
Apple Pay
Available for: iPhone 6, iPad mini 3, and iPad Air 2
Impact: Some cards may allow a terminal to retrieve limited recent
transaction information when making
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
APPLE-SA-2015-09-16-2 Xcode 7.0
Xcode 7.0 is now available and addresses the following:
DevTools
Available for: OS X Yosemite v10.10.4 or later
Impact: An attacker may be able to bypass access restrictions
Description: An API issue existed in th
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
APPLE-SA-2015-09-16-3 iTunes 12.3
iTunes 12.3 is now available and addresses the following:
iTunes
Available for: Windows 7 and later
Impact: Applications that use CoreText may be vulnerable to
unexpected application termination or arbitrary code
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
APPLE-SA-2015-09-16-4 OS X Server 5.0.3
OS X Server 5.0.3 is now available and addresses the following:
apache
Available for: OS X Yosemite v10.10.4 or later
Impact: Multiple vulnerabilities in Apache, the most serious of
which may allow a remote
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
APPLE-SA-2015-09-21-1 watchOS 2
watchOS 2 is now available and addresses the following:
Apple Pay
Available for: Apple Watch Sport, Apple Watch,
and Apple Watch Edition
Impact: Some cards may allow a terminal to retrieve limited recent
transactio
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
APPLE-SA-2015-09-30-01 iOS 9.0.2
iOS 9.0.2 is now available and addresses the following:
Lock Screen
Available for: iPhone 4s and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: A person with physical access to an iOS devic
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
APPLE-SA-2015-09-30-2 Safari 9
Safari 9 is now available and addresses the following:
Safari
Available for: OS X Mavericks v10.9.5,
OS X Yosemite v10.10.5 and OS X El Capitan v10.11
Impact: Visiting a malicious website may lead to user interface
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
APPLE-SA-2015-09-30-3 OS X El Capitan 10.11
OS X El Capitan 10.11 is now available and addresses the following:
Address Book
Available for: Mac OS X v10.6.8 and later
Impact: A local attacker may be able to inject arbitrary code to
processes load
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
APPLE-SA-2015-10-15-1 Keynote 6.6, Pages 5.6, Numbers 3.6, and
iWork for iOS 2.6
Keynote 6.6, Pages 5.6, Numbers 3.6, and iWork for iOS 2.6 are now
available which address the following:
Keynote, Pages, and Numbers
Available for: OS X Yosemite v1
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
APPLE-SA-2015-10-21-1 iOS 9.1
iOS 9.1 is now available and addresses the following:
Accelerate Framework
Available for: iPhone 4s and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: Visiting a maliciously crafted website ma
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
APPLE-SA-2015-10-21-2 watchOS 2.0.1
watchOS 2.0.1 is now available and addresses the following:
Apple Pay
Available for: Apple Watch Sport, Apple Watch, Apple Watch Edition,
and Apple Watch Hermes
Impact: Some cards may allow a terminal to retri
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
APPLE-SA-2015-10-21-3 Safari 9.0.1
Safari 9.0.1 is now available and addresses the following:
WebKit
Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5,
and OS X El Capitan v10.11
Impact: Visiting a maliciously crafted website may lead
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
APPLE-SA-2015-10-21-4 OS X El Capitan 10.11.1 and Security Update
2015-007
OS X El Capitan 10.11.1 and Security Update 2015-007 are now
available and address the following:
Accelerate Framework
Available for: OS X Mavericks v10.9.5, OS X Yosemite
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
APPLE-SA-2015-10-21-5 iTunes 12.3.1
iTunes 12.3.1 is now available and addresses the following:
iTunes
Available for: Windows 7 and later
Impact: A man-in-the-middle attack while browsing the iTunes Store
via iTunes may result in unexpected appli
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
APPLE-SA-2015-10-21-6 Mac EFI Security Update 2015-002
Mac EFI Security Update 2015-002 is now available and addresses the
following:
EFI
Available for: OS X Mavericks v10.9.5
Impact: An attacker can exercise unused EFI functions
Description: A
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
APPLE-SA-2015-10-21-7 Xcode 7.1
Xcode 7.1 is now available and addresses the following:
Swift
Available for: OS X Yosemite v10.10.5 or later
Impact: Swift programs performing certain type conversions may
receive unexpected values
Description: A
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
APPLE-SA-2015-10-21-8 OS X Server 5.0.15
OS X Server 5.0.15 is now available and addresses the following:
BIND
Available for: OS X Yosemite 10.10.5,
OS X El Capitan 10.11.1 or later
Impact: Multiple vulnerabilities in BIND
Description: Multiple
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
APPLE-SA-2015-12-08-4 watchOS 2.1
watchOS 2.1 is now available and addresses the following:
AppSandbox
Available for: Apple Watch Sport, Apple Watch, Apple Watch Edition,
and Apple Watch Hermes
Impact: A malicious application may maintain access
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
APPLE-SA-2015-12-08-1 iOS 9.2
iOS 9.2 is now available and addresses the following:
AppleMobileFileIntegrity
Available for: iPhone 4s and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: A malicious application may be able
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
APPLE-SA-2015-12-08-4 watchOS 2.1
watchOS 2.1 is now available and addresses the following:
AppSandbox
Available for: Apple Watch Sport, Apple Watch, Apple Watch Edition,
and Apple Watch Hermes
Impact: A malicious application may maintain access
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
APPLE-SA-2015-12-08-5 Safari 9.0.2
Safari 9.0.2 is now available and addresses the following:
WebKit
Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5,
OS X El Capitan v10.11 and v10.11.1
Impact: Visiting a maliciously crafted websit
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
APPLE-SA-2015-12-08-2 tvOS 9.1
tvOS 9.1 is now available and addresses the following:
AppleMobileFileIntegrity
Available for: Apple TV (4th generation)
Impact: A malicious application may be able to execute arbitrary
code with system privileges
D
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
APPLE-SA-2015-12-08-3 OS X El Capitan 10.11.2 and Security Update 2015-008
OS X El Capitan 10.11.2 and Security Update 2015-008 is now available
and addresses the following:
apache_mod_php
Available for: OS X El Capitan v10.11 and v10.11.1
Impact:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
APPLE-SA-2015-12-08-6 Xcode 7.2
Xcode 7.2 is now available and addresses the following:
Git
Available for: OS X Yosemite v10.10.5 or later
Impact: Multiple vulnerabilities existed in Git
Description: Multiple vulnerabilities existed in Git vers
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
APPLE-SA-2015-12-11-1 iTunes 12.3.2
iTunes 12.3.2 is now available and addresses the following:
WebKit
Available for: Windows 7 and later
Impact: Visiting a maliciously crafted website may lead to arbitrary
code execution
Description: Multiple m
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
APPLE-SA-2016-01-07-1 QuickTime 7.7.9
[Re-sending with a valid signature]
QuickTime 7.7.9 is now available and addresses the following:
QuickTime
Available for: Windows 7 and Windows Vista
Impact: Viewing a maliciously crafted movie file may lea
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
APPLE-SA-2016-01-07-1 QuickTime 7.7.9
QuickTime 7.7.9 is now available and addresses the following:
QuickTime
Available for: Windows 7 and Windows Vista
Impact: Viewing a maliciously crafted movie file may lead to an
unexpected application termi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
APPLE-SA-2016-01-19-1 iOS 9.2.1
iOS 9.2.1 is now available and addresses the following:
Disk Images
Available for: iPhone 4s and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: A local user may be able to execute arbitrary
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
APPLE-SA-2016-01-19-2 OS X El Capitan 10.11.3 and Security Update
2016-001
OS X El Capitan 10.11.3 and Security Update 2016-001 is now available
and addresses the following:
AppleGraphicsPowerManagement
Available for: OS X El Capitan v10.11 to v1
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
APPLE-SA-2016-01-19-3 Safari 9.0.3
Safari 9.0.3 is now available and addresses the following:
WebKit
Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10.5,
OS X El Capitan v10.11 to v10.11.2
Impact: Visiting a maliciously crafted website
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
APPLE-SA-2016-01-25-1 tvOS 9.1.1
tvOS 9.1.1 is now available and addresses the following:
Disk Images
Available for: Apple TV (4th generation)
Impact: A local user may be able to execute arbitrary code with
kernel privileges
Description: A memor
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
APPLE-SA-2016-02-25-1 Apple TV 7.2.1
Apple TV 7.2.1 is now available and addresses the following:
bootp
Available for: Apple TV (3rd Generation)
Impact: A malicious Wi-Fi network may be able to determine networks
a device has previously accessed
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
APPLE-SA-2016-03-21-1 iOS 9.3
iOS 9.3 is now available and addresses the following:
AppleUSBNetworking
Available for: iPhone 4s and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: An application may be able to execute arbit
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
APPLE-SA-2016-03-21-2 watchOS 2.2
watchOS 2.2 is now available and addresses the following:
Disk Images
Available for: Apple Watch Sport, Apple Watch, Apple Watch Edition,
and Apple Watch Hermes
Impact: An application may be able to execute arbit
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
APPLE-SA-2016-03-21-4 Xcode 7.3
Xcode 7.3 is now available and addresses the following:
otool
Available for: OS X El Capitan v10.11 and later
Impact: A local attacker may be able to cause unexpected application
termination or arbitrary code execu
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
APPLE-SA-2016-03-21-7 OS X Server 5.1
OS X Server 5.1 is now available and addresses the following:
Server App
Available for: OS X Yosemite v10.10.5 and later
Impact: An administrator may unknowingly store backups on a volume
without permissions
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
APPLE-SA-2016-03-21-3 tvOS 9.2
tvOS 9.2 is now available and addresses the following:
FontParser
Available for: Apple TV (4th generation)
Impact: Opening a maliciously crafted PDF file may lead to an
unexpected application termination or arbitrar
101 - 200 of 424 matches
Mail list logo