-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 APPLE-SA-2016-10-24-5 watchOS 3.1 watchOS 3.1 is now available and addresses the following: CoreGraphics Available for: All Apple Watch models Impact: Viewing a maliciously crafted JPEG file may lead to arbitrary code execution Description: A memory corruption issue was addressed through improved memory handling. CVE-2016-4673: Marco Grassi (@marcograss) of KeenLab (@keen_lab), Tencent FontParser Available for: All Apple Watch models Impact: Parsing a maliciously crafted font may disclose sensitive user information Description: An out-of-bounds read was addressed through improved bounds checking. CVE-2016-4660: Ke Liu of Tencent's Xuanwu Lab Kernel Available for: All Apple Watch models Impact: An application may be able to disclose kernel memory Description: A validation issue was addressed through improved input sanitization. CVE-2016-4680: Max Bazaliy of Lookout and in7egral libarchive Available for: All Apple Watch models Impact: A malicious archive may be able to overwrite arbitrary files Description: An issue existed within the path validation logic for symlinks. This issue was addressed through improved path sanitization. CVE-2016-4679: Omer Medan of enSilo Ltd libxpc Available for: All Apple Watch models Impact: An application may be able to execute arbitrary code with root privileges Description: A logic issue was addressed through additional restrictions. CVE-2016-4675: Ian Beer of Google Project Zero Sandbox Profiles Available for: All Apple Watch models Impact: An application may be able to retrieve metadata of photo directories Description: An access issue was addressed through additional sandbox restrictions on third party applications. CVE-2016-4664: Razvan Deaconescu, Mihai Chiroiu (University POLITEHNICA of Bucharest); Luke Deshotels, William Enck (North Carolina State University); Lucas Vincenzo Davi, Ahmad-Reza Sadeghi (TU Darmstadt) Sandbox Profiles Available for: All Apple Watch models Impact: An application may be able to retrieve metadata of audio recording directories Description: An access issue was addressed through additional sandbox restrictions on third party applications. CVE-2016-4665: Razvan Deaconescu, Mihai Chiroiu (University POLITEHNICA of Bucharest); Luke Deshotels, William Enck (North Carolina State University); Lucas Vincenzo Davi, Ahmad-Reza Sadeghi (TU Darmstadt) System Boot Available for: All Apple Watch models Impact: A local user may be able to cause an unexpected system termination or arbitrary code execution in the kernel Description: Multiple input validation issues existed in MIG generated code. These issues were addressed through improved validation. CVE-2016-4669: Ian Beer of Google Project Zero Installation note: Instructions on how to update your Apple Watch software are available at https://support.apple.com/kb/HT204641 To check the version on your Apple Watch, open the Apple Watch app on your iPhone and select "My Watch > General > About". Alternatively, on your watch, select "My Watch > General > About". Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Comment: GPGTools - https://gpgtools.org iQIcBAEBCgAGBQJYDlqaAAoJEIOj74w0bLRGL0cP/jI73SMnntaD+ciaupPvKqci kyNAjI/pG7SEVbAlXA+stcVA38lk8MX40AaLdMaU9tx9WBc7XplCnC37F6Z5+Db0 +9yZXUi9WtTH2gc11Sbxi2OSQn0R7JA+fos47VQ7xFfppVmjP99ie55xoY4d1ksv ocrsFNfonTTYypaFNPbCPxXfqXFv1zBb7+xe2pioHs/XJYLq8pR/hItfFoQFWFIU 5X+O2ih0/8a0xiGcwI9hSk6OCgb+tVId50FWcG5/6u6p5rshGVMpt/Foo16aLEC1 vGG0DOAaPJS9ESiG40z+kSUMk44D2sNKDdPf2mq3e9DUF58DXn2/KB8uggiU/jZ+ Dj7HjMkQKiQSu5FwvIwNap0W4TMIft6PfR9LiixAxCYux4dY9mOts8lsqCQzAr/3 9aQsIYEnNCEf1KM6CDDNGJCUmC0DGxMz9bqmU/shLxtq4gVCK4l8zbBUfcgpdN6u xl3EDvzaR5VAvrJdPaF0mZj+L5/5lUslrYc5BSO14jgLc4bjZpXKC9EC8FsXFG9T ytLh6/oga2NPzf+Mn8lpdUxYQl4HvASexnEmVhTxuYpwroesBKuy5C/C9B9wNPTq GYbAttd2hPKc+BRay5ddv0XWlfnTwLV6e+mn6jEHqwaUvvR+d3+eIB1/NIQ30qEp An4j1PJOV0RO473aVuZw =NsnX -----END PGP SIGNATURE-----