MuscleNerd:
84% of the fixes in today's 7.1.1 were not Apple. 16 of the 19 were webkit mnerd.me/V8KR . JBers stay away from it though!
From: Apple Product Security <product-security-noreply@lists.apple.com>
Date: Tue, 22 Apr 2014 11:14:11 -0700
Subject: APPLE-SA-2014-04-22-2 iOS 7.1.1
To: security-announce@lists.apple.com
--===============1927530858==
Content-type: multipart/signed;
boundary="Apple-Mail=_52AE697A-80EE-4B94-A713-5E041D37043E";
protocol="application/pgp-signature"; micalg=pgp-sha1
--Apple-Mail=_52AE697A-80EE-4B94-A713-5E041D37043E
Content-Transfer-Encoding: 7bit
Content-Type: text/plain;
charset=us-ascii
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
APPLE-SA-2014-04-22-2 iOS 7.1.1
iOS 7.1.1 is now available and addresses the following:
CFNetwork HTTPProtocol
Available for: iPhone 4 and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: An attacker in a privileged network position can obtain web
site credentials
Description: Set-Cookie HTTP headers would be processed even if the
connection closed before the header line was complete. An attacker
could strip security settings from the cookie by forcing the
connection to close before the security settings were sent, and then
obtain the value of the unprotected cookie. This issue was addressed
by ignoring incomplete HTTP header lines.
CVE-ID
CVE-2014-1296 : Antoine Delignat-Lavaud of Prosecco at Inria Paris
IOKit Kernel
Available for: iPhone 4 and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: A local user can read kernel pointers, which can be used to
bypass kernel address space layout randomization
Description: A set of kernel pointers stored in an IOKit object
could be retrieved from userland. This issue was addressed through
removing the pointers from the object.
CVE-ID
CVE-2014-1320 : Ian Beer of Google Project Zero working with HP's
Zero Day Initiative
Security - Secure Transport
Available for: iPhone 4 and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: An attacker with a privileged network position may capture
data or change the operations performed in sessions protected by SSL
Description: In a 'triple handshake' attack, it was possible for an
attacker to establish two connections which had the same encryption
keys and handshake, insert the attacker's data in one connection, and
renegotiate so that the connections may be forwarded to each other.
To prevent attacks based on this scenario, Secure Transport was
changed so that, by default, a renegotiation must present the same
server certificate as was presented in the original connection.
CVE-ID
CVE-2014-1295 : Antoine Delignat-Lavaud, Karthikeyan Bhargavan and
Alfredo Pironti of Prosecco at Inria Paris
WebKit
Available for: iPhone 4 and later,
iPod touch (5th generation) and later, iPad 2 and later
Impact: Visiting a maliciously crafted website may lead to an
unexpected application termination or arbitrary code execution
Description: Multiple memory corruption issues existed in WebKit.
These issues were addressed through improved memory handling.
CVE-ID
CVE-2013-2871 : miaubiz
CVE-2014-1298 : Google Chrome Security Team
CVE-2014-1299 : Google Chrome Security Team, Apple, Renata Hodovan of
University of Szeged / Samsung Electronics
CVE-2014-1300 : Ian Beer of Google Project Zero working with HP's
Zero Day Initiative
CVE-2014-1302 : Google Chrome Security Team, Apple
CVE-2014-1303 : KeenTeam working with HP's Zero Day Initiative
CVE-2014-1304 : Apple
CVE-2014-1305 : Apple
CVE-2014-1307 : Google Chrome Security Team
CVE-2014-1308 : Google Chrome Security Team
CVE-2014-1309 : cloudfuzzer
CVE-2014-1310 : Google Chrome Security Team
CVE-2014-1311 : Google Chrome Security Team
CVE-2014-1312 : Google Chrome Security Team
CVE-2014-1313 : Google Chrome Security Team
CVE-2014-1713 : VUPEN working with HP's Zero Day Initiative
Installation note:
This update is available through iTunes and Software Update on your
iOS device, and will not appear in your computer's Software Update
application, or in the Apple Downloads site. Make sure you have an
Internet connection and have installed the latest version of iTunes
from www.apple.com/itunes/
iTunes and Software Update on the device will automatically check
Apple's update server on its weekly schedule. When an update is
detected, it is downloaded and the option to be installed is
presented to the user when the iOS device is docked. We recommend
applying the update immediately if possible. Selecting Don't Install
will present the option the next time you connect your iOS device.
The automatic update process may take up to a week depending on the
day that iTunes or the device checks for updates. You may manually
obtain the update via the Check for Updates button within iTunes, or
the Software Update on your device.
To check that the iPhone, iPod touch, or iPad has been updated:
* Navigate to Settings
* Select General
* Select About. The version after applying this update
will be "7.1.1".
Information will also be posted to the Apple Security Updates
web site: http://support.apple.com/kb/HT1222
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.22 (Darwin)
Comment: GPGTools - http://gpgtools.org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=ilSw
-----END PGP SIGNATURE-----
--Apple-Mail=_52AE697A-80EE-4B94-A713-5E041D37043E
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment;
filename=signature.asc
Content-Type: application/pgp-signature;
name=signature.asc
Content-Description: Message signed with OpenPGP using GPGMail
-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - http://gpgtools.org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=DiyM
-----END PGP SIGNATURE-----
--Apple-Mail=_52AE697A-80EE-4B94-A713-5E041D37043E--
--===============1927530858==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline
IF9fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fCkRvIG5vdCBw
b3N0IGFkbWluIHJlcXVlc3RzIHRvIHRoZSBsaXN0LiBUaGV5IHdpbGwgYmUgaWdub3JlZC4KU2Vj
dXJpdHktYW5ub3VuY2UgbWFpbGluZyBsaXN0ICAgICAgKFNlY3VyaXR5LWFubm91bmNlQGxpc3Rz
LmFwcGxlLmNvbSkKSGVscC9VbnN1YnNjcmliZS9VcGRhdGUgeW91ciBTdWJzY3JpcHRpb246Cmh0
dHBzOi8vbGlzdHMuYXBwbGUuY29tL21haWxtYW4vb3B0aW9ucy9zZWN1cml0eS1hbm5vdW5jZS9t
dXNjbGVuZXJkJTQwbWFjLmNvbQoKVGhpcyBlbWFpbCBzZW50IHRvIG11c2NsZW5lcmRAbWFjLmNv
bQ==
--===============1927530858==--