-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
APPLE-SA-2017-10-31-6 iTunes 12.7.1 for Windows
iTunes 12.7.1 for Windows is now available and addresses the
following:
WebKit
Available for: Windows 7 and later
Impact: Processing maliciously crafted web content may lead to
arbitrary code
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
APPLE-SA-2017-10-31-11
Additional information for APPLE-SA-2017-09-20-3 tvOS 11
tvOS 11 addresses the following:
802.1X
Available for: Apple TV (4th generation)
Impact: An attacker may be able to exploit weaknesses in TLS 1.0
Description: A
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
APPLE-SA-2017-10-31-2 macOS High Sierra 10.13.1,
Security Update 2017-001 Sierra, Security Update 2017-004 El Capitan
macOS High Sierra 10.13.1, Security Update 2017-001 Sierra, Security
Update 2017-004 El Capitan are now available and address the
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
APPLE-SA-2017-10-31-12
Additional information for APPLE-SA-2017-09-25-9 macOS Server 5.4
macOS Server 5.4 addresses the following:
FreeRadius
Available for: macOS High Sierra 10.13
Impact: Multiple issues in FreeRADIUS
Description: Multiple
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
APPLE-SA-2017-10-31-3 tvOS 11.1
tvOS 11.1 is now available and addresses the following:
CoreText
Available for: Apple TV 4K and Apple TV (4th generation)
Impact: Processing a maliciously crafted text file may lead to an
unexpected application
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
APPLE-SA-2017-10-31-10
Additional information for APPLE-SA-2017-09-20-2 watchOS 4
watchOS 4 addresses the following:
802.1X
Available for: All Apple Watch models
Impact: An attacker may be able to exploit weaknesses in TLS 1.0
Description: A
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
APPLE-SA-2017-10-31-7 iCloud for Windows 7.1
iCloud for Windows 7.1 is now available and addresses the following:
WebKit
Available for: Windows 7 and later
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
APPLE-SA-2017-10-31-9
Additional information for APPLE-SA-2017-09-19-1 iOS 11
iOS 11 addresses the following:
802.1X
Available for: iPhone 5s and later, iPad Air and later, and iPod
touch 6th generation
Impact: An attacker may be able to exploit
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
APPLE-SA-2017-10-31-4 watchOS 4.1
watchOS 4.1 is now available and addresses the following:
CoreText
Available for: All Apple Watch models
Impact: Processing a maliciously crafted text file may lead to an
unexpected application termination
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-4012-1 secur...@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
October 31, 2017
-Original Message-
From: security-al...@hpe.com [mailto:security-al...@hpe.com]
Sent: Tuesday, October 17, 2017 3:27 PM
Subject: [security bulletin] HPESBHF03785 rev.1 - HPE B-Series SAN Network
Advisor Software, Multiple Remote Vulnerabilities
-BEGIN PGP SIGNED MESSAGE-
Hash:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
- -
Debian Security Advisory DSA-4009-1 secur...@debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
October 29, 2017
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
[slackware-security] wget (SSA:2017-300-02)
New wget packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1,
14.2, and -current to fix security issues.
Here are the details from the Slackware 14.2 ChangeLog:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03787en_us
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: hpesbhf03787en_us
Version: 1
14 matches
Mail list logo