APPLE-SA-2020-12-14-2 iOS 12.5

Related Vulnerabilities: CVE-2020-27951  
                							

                <!--X-Body-Begin-->
<!--X-User-Header-->
<a href="/fulldisclosure/"><img src="/images/fulldisclosure-logo.png" class="l-logo right" alt="fulldisclosure logo" width="80"></a>
<h2 class="m-list"><a href="/fulldisclosure/">Full Disclosure</a>
mailing list archives</h2>
<!--X-User-Header-End-->
<!--X-TopPNI-->
<div class="nav-bar">
<div class="nav-link">
<a href="24"><img src="/images/left-icon-16x16.png" alt="Previous" width="16" height="16"></a>
<a href="date.html#25">By Date</a>
<a href="26"><img src="/images/right-icon-16x16.png" alt="Next" width="16" height="16"></a>
</div>
<div class="nav-link">
<a href="24"><img src="/images/left-icon-16x16.png" alt="Previous" width="16" height="16"></a>
<a href="index.html#25">By Thread</a>
<a href="26"><img src="/images/right-icon-16x16.png" alt="Next" width="16" height="16"></a>
</div>
<form class="nst-search center" action="/search/fulldisclosure">
<input class="nst-search-q" name="q" type="search" placeholder="List Archive Search">
<button class="nst-search-button" title="Search">
<img style="width:100%;aspect-ratio:1/1;" alt="" aria-hidden="true" src="/shared/images/nst-icons.svg#search">
</button>
</form>

</div>

<!--X-TopPNI-End-->
<!--X-MsgBody-->
<!--X-Subject-Header-Begin-->
<h1 class="m-title">APPLE-SA-2020-12-14-2 iOS 12.5</h1>
<hr>
<!--X-Subject-Header-End-->
<!--X-Head-of-Message-->


<em>From</em>: Apple Product Security via Fulldisclosure &lt;fulldisclosure () seclists org&gt;


<em>Date</em>: Mon, 14 Dec 2020 17:16:29 -0800


<!--X-Head-of-Message-End-->
<!--X-Head-Body-Sep-Begin-->
<hr>
<!--X-Head-Body-Sep-End-->
<!--X-Body-of-Message-->
<pre style="margin: 0em;">-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

APPLE-SA-2020-12-14-2 iOS 12.5

iOS 12.5 addresses the following issues. Information about
the security content is also available at
<a rel="nofollow" href="https://support.apple.com/HT212004">https://support.apple.com/HT212004</a>.

Security
Available for: iPhone 5s, iPhone 6, iPhone 6 Plus, iPad Air, iPad
mini 2, iPad mini 3, and iPod touch (6th generation)
Impact: Unauthorized code execution may lead to an authentication
policy violation
Description: This issue was addressed with improved checks.
CVE-2020-27951: Apple

Installation note:

This update is available through iTunes and Software Update on your
iOS device, and will not appear in your computer's Software Update
application, or in the Apple Downloads site. Make sure you have an
Internet connection and have installed the latest version of iTunes
from <a rel="nofollow" href="https://www.apple.com/itunes/">https://www.apple.com/itunes/</a>

iTunes and Software Update on the device will automatically check
Apple's update server on its weekly schedule. When an update is
detected, it is downloaded and the option to be installed is
presented to the user when the iOS device is docked. We recommend
applying the update immediately if possible. Selecting Don't Install
will present the option the next time you connect your iOS device.

The automatic update process may take up to a week depending on the
day that iTunes or the device checks for updates. You may manually
obtain the update via the Check for Updates button within iTunes, or
the Software Update on your device.

To check that the iPhone, iPod touch, or iPad has been updated:

* Navigate to Settings
* Select General
* Select About. The version after applying this update
will be "iOS 12.5".

This message is signed with Apple's Product Security PGP key,
and details are available at:
<a rel="nofollow" href="https://www.apple.com/support/security/pgp/">https://www.apple.com/support/security/pgp/</a>
-----BEGIN PGP SIGNATURE-----

iQIzBAEBCAAdFiEEbURczHs1TP07VIfuZcsbuWJ6jjAFAl/YBjAACgkQZcsbuWJ6
jjChkQ/9Hy0kLQ4l5fzWiRXGyaH+vLwQqI4HXpbfcS0BT5avz6/tfJMu70do2An2
g+Yg/HKi5TthptjKTydhJ2N4dE3n9cbrPXhncmPqczeS4SPt4hZZ6YR1GKff8st8
XpiUBilhB8osyKCNd7jndNZs7I+sknWsakrKGopGABp3CnemViNXL9j1i4LY3Y9k
uMnjTf64tYYKV+iDhjUjFTMcqJL/tG8RFKbUuYSH8UlBCSs88OoZbaG/r52dJ8a7
An6LW/ddgzdCeQFNAP1a/Egn0d3LfhZDi3V6M5H55bPknB3dVre7FDmI5aJmynU3
tFYgV1xNhzo8QPmvyM0NzMN7rkrs9wedna0Lt1gU5UUG1g0M8mwQB9zSaZJ/2prp
RzuOvSiZ30t5JQJJi/lSajRn00GmjBDffPUtJYJTRz1M9APmS8fcAcOdfNauZ7Hb
jtimGwG5HnDzNdY+QBdGWjWIikqNldNv3i3E7dDqxrfPPvid5hNs40yjY37BMCa0
VsZDUIIev7avfGhwD9AYCVKYuHTqSSSjCXXvJmniCTUBcdAWQEDNodp7gvCkAlg8
HCNuv279nHt5VXVnH+svyHI4TkckW5rY2ElrDAGitqkIcg7LLYfZXesoHawzWkip
MAurqKFEZZIhTDwDt/omkWQb6c1+nkDBTeLDFGNAVNFJpuCONLQ=
=O/bV
-----END PGP SIGNATURE-----

_______________________________________________
Sent through the Full Disclosure mailing list
<a rel="nofollow" href="https://nmap.org/mailman/listinfo/fulldisclosure">https://nmap.org/mailman/listinfo/fulldisclosure</a>
Web Archives &amp; RSS: <a rel="nofollow" href="http://seclists.org/fulldisclosure/">http://seclists.org/fulldisclosure/</a>

</pre>
<!--X-Body-of-Message-End-->
<!--X-MsgBody-End-->
<!--X-Follow-Ups-->
<hr>
<!--X-Follow-Ups-End-->
<!--X-References-->
<!--X-References-End-->
<!--X-BotPNI-->
<div class="nav-bar">
<div class="nav-link">
<a href="24"><img src="/images/left-icon-16x16.png" alt="Previous" width="16" height="16"></a>
<a href="date.html#25">By Date</a>
<a href="26"><img src="/images/right-icon-16x16.png" alt="Next" width="16" height="16"></a>
</div>
<div class="nav-link">
<a href="24"><img src="/images/left-icon-16x16.png" alt="Previous" width="16" height="16"></a>
<a href="index.html#25">By Thread</a>
<a href="26"><img src="/images/right-icon-16x16.png" alt="Next" width="16" height="16"></a>
</div>
</div>
<h3 class="m-thread">Current thread:</h3>
<ul class="thread">
<li><strong>APPLE-SA-2020-12-14-2 iOS 12.5</strong> <em>Apple Product Security via Fulldisclosure (Dec 15)</em>
</li></ul>


<!--X-BotPNI-End-->
<!--X-User-Footer-->
<!--X-User-Footer-End-->
<p>