www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary proprietary-insecurity.html mal...


From: rsiddharth
Subject: www/proprietary proprietary-insecurity.html mal...
Date: Thu, 4 Aug 2016 00:58:49 +0000 (UTC)

CVSROOT:        /web/www
Module name:    www
Changes by:     rsiddharth <rsd>        16/08/04 00:58:49

Modified files:
        proprietary    : proprietary-insecurity.html malware-apple.html 

Log message:
        [#1130155] Add Apple insecurity item.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/proprietary-insecurity.html?cvsroot=www&r1=1.34&r2=1.35
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.html?cvsroot=www&r1=1.31&r2=1.32

Patches:
Index: proprietary-insecurity.html
===================================================================
RCS file: /web/www/www/proprietary/proprietary-insecurity.html,v
retrieving revision 1.34
retrieving revision 1.35
diff -u -b -r1.34 -r1.35
--- proprietary-insecurity.html 29 Jul 2016 22:33:27 -0000      1.34
+++ proprietary-insecurity.html 4 Aug 2016 00:58:48 -0000       1.35
@@ -21,6 +21,12 @@
 
 <ul>
 <li>
+<p>A vulnerability in Apple's Image I/O API allowed an attacker to
+<a 
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple";>execute
+  malacious code from any application which uses this API to render a
+  certain kind of image file</a>.</p>
+</li>
+<li>
 <p>A bug in a proprietary ASN.1 library, used in cell phone towers as
 well as cell phones and
 routers, <a 
href="http://arstechnica.com/security/2016/07/software-flaw-puts-mobile-phones-and-networks-at-risk-of-complete-takeover";>allows
@@ -343,7 +349,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2016/07/29 22:33:27 $
+$Date: 2016/08/04 00:58:48 $
 <!-- timestamp end -->
 </p>
 </div>

Index: malware-apple.html
===================================================================
RCS file: /web/www/www/proprietary/malware-apple.html,v
retrieving revision 1.31
retrieving revision 1.32
diff -u -b -r1.31 -r1.32
--- malware-apple.html  1 Jul 2016 22:20:48 -0000       1.31
+++ malware-apple.html  4 Aug 2016 00:58:49 -0000       1.32
@@ -123,6 +123,13 @@
 
 <ul>
   <li>
+    <p>A vulnerability in Apple's Image I/O API allowed an attacker
+    to <a 
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple";>execute
+    malacious code from any application which uses this API to render
+    a certain kind of image file</a>.</p>
+  </li>
+
+  <li>
     <p>A bug in the iThings Messages
       app <a 
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/";>allowed
         a malicious web site to extract all the user's messaging history</a>.
@@ -431,7 +438,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2016/07/01 22:20:48 $
+$Date: 2016/08/04 00:58:49 $
 <!-- timestamp end -->
 </p>
 </div>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]