-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 APPLE-SA-2017-12-6-3 watchOS 4.2 watchOS 4.2 addresses the following: IOSurface Available for: All Apple Watch models Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-13861: Ian Beer of Google Project Zero Kernel Available for: All Apple Watch models Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-13862: Apple CVE-2017-13876: Ian Beer of Google Project Zero Kernel Available for: All Apple Watch models Impact: An application may be able to read restricted memory Description: An out-of-bounds read was addressed with improved bounds checking. CVE-2017-13833: Brandon Azad Kernel Available for: All Apple Watch models Impact: An application may be able to read restricted memory Description: A type confusion issue was addressed with improved memory handling. CVE-2017-13855: Jann Horn of Google Project Zero Kernel Available for: All Apple Watch models Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-13867: Ian Beer of Google Project Zero Kernel Available for: All Apple Watch models Impact: An application may be able to read restricted memory Description: A validation issue was addressed with improved input sanitization. CVE-2017-13865: Ian Beer of Google Project Zero CVE-2017-13868: Brandon Azad CVE-2017-13869: Jann Horn of Google Project Zero Wi-Fi Available for: Apple Watch (1st Generation) and Apple Watch Series 3 Released for Apple Watch Series 1 and Apple Watch Series 2 in watchOS 4.1. Impact: An attacker in Wi-Fi range may force nonce reuse in WPA multicast/GTK clients (Key Reinstallation Attacks - KRACK) Description: A logic issue existed in the handling of state transitions. This was addressed with improved state management. CVE-2017-13080: Mathy Vanhoef of the imec-DistriNet group at KU Leuven Installation note: Instructions on how to update your Apple Watch software are available at https://support.apple.com/kb/HT204641 To check the version on your Apple Watch, open the Apple Watch app on your iPhone and select "My Watch > General > About". Alternatively, on your watch, select "My Watch > General > About". Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- iQJdBAEBCgBHFiEEcuX4rtoRe4X62yWlg6PvjDRstEYFAlooN+gpHHByb2R1Y3Qt c2VjdXJpdHktbm9yZXBseUBsaXN0cy5hcHBsZS5jb20ACgkQg6PvjDRstEYsAg// Sqw8hH76j7oAfy1DrCou9xuCG57CXRmzB4N6mol5Y7uRjGvKd/BVpd2J4O0erWNV TWC4TBroEze4d9hKPC5XBqnu0jTnkUzKk1VCUetvqAw1OIuxTiuHmgWrxRidGYPm Y8kV84/hKr2B8Q4udqILWnEdASWgcBbY1FO90Bdha4hEBsudeI9Z783vXN3PLpbE XjW3A8SXcd8ZMSd/cjIeux2cBkeCJoKIz7AodUNo3ohy5Jx4E/weHYyOitEKg7BZ s1oD18vwkecT8j2ApPvHP4W2EuIHje7CldDHq4I1zs1z9RVAHzMIZTeG4cZ0wB4x pBy7LT0RJWa7v2cmA1GrF8ayyNDSbgoJau2PidWYiyicaiA/4//RAjVp+F44ZX+S rQ/3UKhrPO1+jiX2LX/3Zx5t5MS79AeKwt/zOuEpQfdJ7wmys2U6o5x8c870I0Bi s3APgXbOpYeIo30CwVIEiKb4VGtoH43Rf+CqsoG20YNY06Y6h4LFe99ztE6m9ljA SyBg0NnRAZgnHWswukMX7m5ZSrToooxfzMfB30eOOX4wEuZ+wVp6g8NYuGay5ChD 0IsoT4g5/Tcq0p/q3lEji32kOaABgmf6pIxHzrYlu+YaiFxbQg0EQmwoW1by6Ute Axc/NkvcZueSm4PfFgXke38d2H7l7ekULAqs6fMXMKY= =ErJE -----END PGP SIGNATURE-----