[prev in list] [next in list] [prev in thread] [next in thread] 

List:       full-disclosure
Subject:    [FD] APPLE-SA-2023-09-07-3 watchOS 9.6.2
From:       Apple Product Security via Fulldisclosure <fulldisclosure () seclists ! org>
Date:       2023-09-07 22:18:44
Message-ID: E590FC24-5948-4244-AE88-E22DD87042F4 () lists ! apple ! com
[Download RAW message or body]

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

APPLE-SA-2023-09-07-3 watchOS 9.6.2

watchOS 9.6.2 addresses the following issues.
Information about the security content is also available at
https://support.apple.com/kb/HT213907.

Apple maintains a Security Updates page at
https://support.apple.com/HT201222 which lists recent
software updates with security advisories.

Wallet
Available for: Apple Watch Series 4 and later
Impact: A maliciously crafted attachment may result in arbitrary code
execution. Apple is aware of a report that this issue may have been
actively exploited.
Description: A validation issue was addressed with improved logic.
CVE-2023-41061: Apple

Additional recognition

Wallet
We would like to acknowledge The Citizen Lab at The University of
Torontoʼs Munk School for their assistance.

Instructions on how to update your Apple Watch software are available
at https://support.apple.com/kb/HT204641  To check the version on
your Apple Watch, open the Apple Watch app on your iPhone and select
"My Watch > General > About".  Alternatively, on your watch, select
"My Watch > General > About".
All information is also posted on the Apple Security Updates
web site: https://support.apple.com/en-us/HT201222.

This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----
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=4Cnz
-----END PGP SIGNATURE-----

_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: https://seclists.org/fulldisclosure/
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic