Apple Security Advisory 2016-12-13-8 - Transporter 1.9.2 is now available and addresses an information disclosure vulnerability.
a15c7b8671a1b605dfb13cba0b47053d45b9312355517a08c8952b2087599eda
Apple Security Advisory 2016-12-13-7 - This advisory provides additional information in regards to watchOS 3.1.1 fixes as originally documented in APPLE-SA-2016-12-12-2.
1e75ac1d7e84337d43fda5523d2559c90e0014064b306b2c2c06c43e2fb37d94
Apple Security Advisory 2016-12-13-4 - iCloud for Windows v6.1 is now available and addresses memory corruption, arbitrary code execution, and various other vulnerabilities.
f9f2e0e3cd17cfbd20fb428973c02abebf6c74592c089a643061a74e1f8412a4
Apple Security Advisory 2016-12-13-5 - This advisory provides additional information in regards to iOS 10.2 fixes as originally documented in APPLE-SA-2016-12-12-1.
c76b2facaf88977456f7443e4116d5d542dddbae7939376c8c47ecf19fcff957
Apple Security Advisory 2016-12-13-6 - This advisory provides additional information in regards to tvOS 10.1 fixes as originally documented in APPLE-SA-2016-12-12-3.
29a768aaf01478b8d97cab781144a949c5f45c52011168e14464b7f343949ef0
Apple Security Advisory 2016-12-13-3 - iTunes 12.5.4 is now available and addresses memory corruption, arbitrary code execution, and various other vulnerabilities.
407486bf89d0f2e73b35a0728f1320d49145c9383f340da1734d4a06a1e90a34
Apple Security Advisory 2016-12-13-2 - Safari 10.0.2 is now available and addresses cross site scripting, arbitrary code execution, and various other vulnerabilities.
986fc3ac166c04825882fb3e3f511652563a6bd564900b0b853d90834b050dff
Apple Security Advisory 2016-12-13-1 - macOS 10.12.2 is now available and addresses arbitrary code execution, denial of service, and various other vulnerabilities.
68bf50743be919151d9547b2351d633298a9bfe57d7160fac7541f89315f5b98
Ubuntu Security Notice 3155-1 - Multiple security vulnerabilities were discovered in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to conduct cross-site scripting attacks, obtain sensitive information, cause a denial of service via application crash, or execute arbitrary code. Various other issues were also addressed.
b6364d5c8c628bdd3dd607dcd630f92aac73f757ae6bad2d66a2c640a03b6bf8
Red Hat Security Advisory 2016-2945-01 - Red Hat Single Sign-On 7.0 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications. This asynchronous patch is a security update for Red Hat Single Sign-On 7.0. Security Fix: It was found that Keycloak did not implement authentication flow correctly. An attacker could use this flaw to construct a phishing URL, from which he could hijack the user's session. This could lead to information disclosure, or permit further possible attacks.
bbad4c80114dd4575132480519035b653d18cbdfd472eef285d492efc8e3fa92
Ubuntu Security Notice 3156-1 - Jann Horn discovered that APT incorrectly handled InRelease files. If a remote attacker were able to perform a man-in-the-middle attack, this flaw could potentially be used to install altered packages.
b7eb80c0b70482b71b386b58b45e73716f7e3508503ad770ba34c88879d48914
McAfee Virus Scan Enterprise for Linux suffers from a remote code execution vulnerability.
26d7834cf5815b1060880e6f39aced196e9baa8ba2abaefb8044358b1c90a16b
As a part of the KNOX extensions available on Samsung devices, Samsung provides a TrustZone trustlet which allows the generation of OTP tokens. The tokens themselves are generated in a TrustZone application within the TEE (UID: fffffffff0000000000000000000001e), which can be communicated with using the "OTP" service, published by "otp_server". Many of the internal commands supported by the trustlet must either unwrap or wrap a token. They do so by calling the functions "otp_unwrap" and "otp_wrap", correspondingly. Both functions copy the internal token data to a local stack based buffer before attempting to wrap or unwrap it. However, this copy operation is performed using a length field supplied in the user's buffer (the length field's offset changes according to the calling code-path), which is not validated at all. This means an attacker can supply a length field larger than the stack based buffer, causing the user-controlled token data to overflow the stack buffer. There is no stack cookie mitigation in MobiCore trustlets. On the device I'm working on (SM-G925V), the "OTP" service can be accessed from any user, including from the SELinux context "untrusted_app". Successfully exploiting this vulnerability should allow a user to elevate privileges to the TrustZone TEE.
fdac4762f7c4537ec554207fd8fe7e51deeb9d222a47b7996bddc9ce87274962
apt suffers from a repository signing bypass via memory allocation failure.
c29167700d9cf86ba6d903c347e03b32af971e7cb4e71b156fcea3249a80e545
This bulletin summary lists six bulletins that have undergone a major revision increment.
9fe3fb9f429d28ef6a35efab92cdd602042c8180af7711201f091bd2fa8ec90c
This bulletin summary lists twelve released Microsoft security bulletins for December, 2016.
e2e2cc6fd20761047644c7fbbd0fe22ab731670844b479b2148be246699651b4