{"id":58732,"date":"2016-10-24T15:55:56","date_gmt":"2016-10-24T22:55:56","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=58732"},"modified":"2017-03-20T13:04:08","modified_gmt":"2017-03-20T20:04:08","slug":"apple-releases-macos-sierra-10-12-1-and-more-with-security-fixes","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-sierra-10-12-1-and-more-with-security-fixes\/","title":{"rendered":"Apple Releases macOS Sierra 10.12.1 and More with Security Fixes"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-58801\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/apple-software-security-updates.jpg\" alt=\"Apple Software Security Updates\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/apple-software-security-updates.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/apple-software-security-updates-150x75.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/apple-software-security-updates-300x150.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Today, Apple released software updates with security fixes for just about all of its products: macOS, iOS, watchOS, tvOS and Safari. Apple&#8217;s\u00a0security updates are available for all Apple Watch models, iPhone 5 and later, iPad (4th generation and later), iPod touch (6th generation and later), Apple TV (4th generation), OS X Yosemite 10.10.5, OS X El Capitan 10.11.6, and macOS Sierra 10.12.<\/p>\n<p>One of the best things you can do to secure your computer is to keep your software up to date, because software vulnerabilities\u00a0tend to be the easiest point of entry for hackers to circumvent\u00a0your defenses. For this reason alone, it&#8217;s imperative to update the software on your Mac, your iOS devices, Apple TV and on your Apple Watch. Below is a list of issues addressed in Apple&#8217;s latest security updates, along with\u00a0directions on where to obtain the updates.<\/p>\n<h3>macOS 10.12.1<\/h3>\n<p>Listed as an update that improves stability, compatibility and security it addresses the following:<\/p>\n<ul>\n<li>Adds an automatic smart album in Photos for Depth Effect images taken on iPhone 7 Plus.<\/li>\n<li>Improves the compatibility of Microsoft Office when using iCloud Desktop and Documents.<\/li>\n<li>Fixes an issue that may prevent Mail from updating when using a Microsoft Exchange account.<\/li>\n<li>Fixes an issue that caused text to sometimes paste incorrectly when using Universal Clipboard.<\/li>\n<li>Improves reliability of Auto Unlock with Apple Watch.<\/li>\n<li>Improves security and stability in Safari.<\/li>\n<li>Fixes an issue that may cause Mail to display unnecessary password prompts for AOL accounts.<\/li>\n<li>Improves compatibility with Fujitsu&#8217;s\u00a0ScanSnap\u00a0scanning software.<\/li>\n<li>Addresses a \u201cFilter Failed\u201d error when printing to some Canon printers.<\/li>\n<li>Fixes an issue that may prevent Grapher files from opening.<\/li>\n<li>Brings back the Safari option to &#8220;never use font sizes smaller than\u201d for displaying fonts on webpages.<\/li>\n<\/ul>\n<p>There are also 16 security fixes included. Most notable are patches to security where a local attacker may have been able to observe the length of a login password upon login,\u00a0the CoreGraphics and ImageIO where viewing or parsing a maliciously crafted JPEG or PDF file may have lead to arbitrary code execution. FontParser also received a patch to prevent the disclosure of sensitive user information if a maliciously crafted font was parsed. FaceTime also received a patch to prevent an attacker in a privileged network position to cause a relayed call to continue transmitting audio while appearing as if the call terminated. The Safari 10.0.1 update is wrapped into this Sierra update as well.\u00a0The full list of security fixes can be seen below or by visiting <a href=\"https:\/\/support.apple.com\/en-us\/HT207275\" target=\"_blank\">the Apple website<\/a>.<\/p>\n<span class=\"collapseomatic \" id=\"id69da487c4edf7\"  tabindex=\"0\" title=\"Click here to see the full list of macOS Sierra 10.12.1 security fixes\"    >Click here to see the full list of macOS Sierra 10.12.1 security fixes<\/span><div id=\"target-id69da487c4edf7\" class=\"collapseomatic_content \">\n<h2>macOS Sierra 10.12.1<\/h2>\n<p><span class=\"note\">Released October 24, 2016<\/span><\/p>\n<p><strong>AppleGraphicsControl<\/strong><\/p>\n<p>Available for: OS X Yosemite v10.10.5 and OS X El Capitan v10.11.6<\/p>\n<p>Impact: An application may be able to execute arbitrary code with kernel privileges<\/p>\n<p>Description: A memory corruption issue was addressed through improved lock state checking.<\/p>\n<p>CVE-2016-4662: Apple<\/p>\n<p><strong>AppleSMC<\/strong><\/p>\n<p>Available for: macOS Sierra 10.12<\/p>\n<p>Impact: A local user may be able to elevate privileges<\/p>\n<p>Description: A null pointer dereference was addressed through improved locking.<\/p>\n<p>CVE-2016-4678: daybreaker@Minionz working with Trend Micro&#8217;s Zero Day Initiative<\/p>\n<p><strong>ATS<\/strong><\/p>\n<p>Available for: macOS Sierra 10.12<\/p>\n<p>Impact: Processing a maliciously crafted font file may lead to arbitrary code execution<\/p>\n<p>Description: A memory corruption issue was addressed through improved memory handling.<\/p>\n<p>CVE-2016-4667: Simmon Huang of alipay, Thelongestusernameofall@gmail.com, Moony Li of Trend Micro, @Flyic<\/p>\n<p><strong>ATS<\/strong><\/p>\n<p>Available for: macOS Sierra 10.12<\/p>\n<p>Impact: A local user may be able to execute arbitrary code with additional privileges<\/p>\n<p>Description: A memory corruption issue was addressed through improved memory handling.<\/p>\n<p>CVE-2016-4674: Shrek_wzw of Qihoo 360 Nirvan Team<\/p>\n<p><strong>CFNetwork Proxies<\/strong><\/p>\n<p>Available for:\u00a0macOS Sierra 10.12<\/p>\n<p>Impact: An attacker in a privileged network position may be able to leak sensitive user information<\/p>\n<p>Description: A phishing issue existed in the handling of proxy credentials. This issue was addressed by removing unsolicited proxy password authentication prompts.<\/p>\n<p>CVE-2016-7579: Jerry Decime<\/p>\n<p><strong>CoreGraphics<\/strong><\/p>\n<p>Available for: macOS Sierra 10.12<\/p>\n<p>Impact: Viewing a maliciously crafted JPEG file may lead to arbitrary code execution<\/p>\n<p>Description: A memory corruption issue was addressed through improved memory handling.<\/p>\n<p>CVE-2016-4673: Marco Grassi (@marcograss) of KeenLab (@keen_lab), Tencent<\/p>\n<p><strong>FaceTime<\/strong><\/p>\n<p>Available for: macOS Sierra 10.12<\/p>\n<p>Impact: An attacker in a privileged network position may be able to cause a relayed call to continue transmitting audio while appearing as if the call terminated<\/p>\n<p>Description: User interface inconsistencies existed in the handling of relayed calls. These issues were addressed through improved FaceTime display logic.<\/p>\n<p>CVE-2016-4635: Martin Vigo (@martin_vigo) of salesforce.com<\/p>\n<p><strong>FontParser<\/strong><\/p>\n<p>Available for: macOS Sierra 10.12<\/p>\n<p>Impact: Parsing a maliciously crafted font may disclose sensitive user information<\/p>\n<p>Description: An out-of-bounds read was addressed through improved bounds checking.<\/p>\n<p>CVE-2016-4660: Ke Liu of Tencent&#8217;s Xuanwu Lab<\/p>\n<p><strong>ImageIO<\/strong><\/p>\n<p>Available for: OS X El Capitan v10.11.6<\/p>\n<p>Impact: Parsing a maliciously crafted PDF may lead to arbitrary code execution<\/p>\n<p>Description: An out-of-bounds write was addressed through improved bounds checking.<\/p>\n<p>CVE-2016-4671: Ke Liu of Tencent&#8217;s Xuanwu Lab, Juwei Lin (@fuzzerDOTcn)<\/p>\n<p><strong>ImageIO<\/strong><\/p>\n<p>Available for: OS X Yosemite v10.10.5 and OS X El Capitan v10.11.6<\/p>\n<p>Impact: Processing a maliciously crafted image may result in the disclosure of process memory<\/p>\n<p>Description: An out-of-bounds read issue existed in the SGI image parsing. This issue was addressed through improved bounds checking.<\/p>\n<p>CVE-2016-4682: Ke Liu of Tencent&#8217;s Xuanwu Lab<\/p>\n<p><strong>libarchive<\/strong><\/p>\n<p>Available for: macOS Sierra 10.12<\/p>\n<p>Impact: A malicious archive may be able to overwrite arbitrary files<\/p>\n<p>Description: An issue existed within the path validation logic for symlinks. This issue was addressed through improved path sanitization.<\/p>\n<p>CVE-2016-4679: Omer Medan of enSilo Ltd<\/p>\n<p><strong>libxpc<\/strong><\/p>\n<p>Available for: OS X Yosemite 10.10.5, OS X El Capitan 10.11.6, and macOS Sierra 10.12<\/p>\n<p>Impact: An application may be able to execute arbitrary code with root privileges<\/p>\n<p>Description: A logic issue was addressed through additional restrictions.<\/p>\n<p>CVE-2016-4675: Ian Beer of Google Project Zero<\/p>\n<p><strong>ntfs<\/strong><\/p>\n<p>Available for: macOS Sierra 10.12<\/p>\n<p>Impact: An application may be able to cause a denial of service<\/p>\n<p>Description: An issue existed in the parsing of disk images. This issue was addressed through improved validation.<\/p>\n<p>CVE-2016-4661: Recurity Labs on behalf of BSI (German Federal Office for Information Security)<\/p>\n<p><strong>NVIDIA Graphics Drivers<\/strong><\/p>\n<p>Available for: OS X Yosemite v10.10.5 and OS X El Capitan v10.11.6<\/p>\n<p>Impact: An application may be able to cause a denial of service<\/p>\n<p>Description: A memory corruption issue was addressed through improved input validation.<\/p>\n<p>CVE-2016-4663: Apple<\/p>\n<p><strong>Security<\/strong><\/p>\n<p>Available for:\u00a0macOS Sierra 10.12<\/p>\n<p>Impact: A local attacker can observe the length of a login password when a user logs in<\/p>\n<p>Description: A logging issue existed in the handling of passwords. This issue was addressed by removing password length logging.<\/p>\n<p>CVE-2016-4670: an anonymous researcher<\/p>\n<p><strong>System Boot<\/strong><\/p>\n<p>Available for: OS X Yosemite 10.10.5, OS X El Capitan 10.11.6, and macOS Sierra 10.12<\/p>\n<p>Impact: A local user may be able to cause an unexpected system termination or arbitrary code execution in the kernel<\/p>\n<p>Description: Multiple input validation issues existed in MIG generated code. These issues were addressed through improved validation.<\/p>\n<p>CVE-2016-4669: Ian Beer of Google Project Zero<\/p>\n<\/div>\n<p>The update can be downloaded by going to the<strong> App Store <\/strong>&gt;<strong> Updates <\/strong>tab.<\/p>\n<p>Note that <a href=\"https:\/\/support.apple.com\/kb\/DL1891?viewlocale=en_US&amp;locale=en_US\" target=\"_blank\">Security Update 2016-002 10.11.6<\/a> was also released today for El Capitan users and <a href=\"https:\/\/support.apple.com\/kb\/dl1890?locale=en_US\" target=\"_blank\">Security Update 2016-006 10.10.5<\/a> for Yosemite users. The list of vulnerabilities these updates addressed have been listed on the <a href=\"https:\/\/support.apple.com\/en-us\/HT207275\" target=\"_blank\">Sierra 10.12.1 security content page<\/a>.<\/p>\n<p>These Security Updates can be downloaded through the download links above or the App Store via the Updates tab.<\/p>\n<h3>iOS 10.1<\/h3>\n<p>Listed as an update that\u00a0includes Portrait Camera for iPhone 7 Plus (beta), transit directions for Japan, stability improvements and bug fixes. The list of improvements is lengthy and can be <a href=\"https:\/\/support.apple.com\/kb\/DL1893?viewlocale=en_US&amp;locale=en_US\" target=\"_blank\">read here<\/a>. As for security related fixes, there were a total of 13. Most of the same issues that were found in macOS were addressed in iOS as well, including the Security, CoreGraphics, ImageIO and FontParser vulnerabilities. For iOS specifically, two Sandbox Profiles vulnerabilities were addressed to prevent an application from being able to retrieve metadata of photo directories and audio recording directories.\u00a0The full list of security fixes can be seen below or by visiting\u00a0<a href=\"https:\/\/support.apple.com\/en-us\/HT207271\" target=\"_blank\">the Apple website<\/a>.<\/p>\n<span class=\"collapseomatic \" id=\"id69da487c4ee55\"  tabindex=\"0\" title=\"Click here to see the full list of iOS 10.1 security fixes\"    >Click here to see the full list of iOS 10.1 security fixes<\/span><div id=\"target-id69da487c4ee55\" class=\"collapseomatic_content \">\n<h2>iOS 10.1<\/h2>\n<p><span class=\"note\">Released October 24, 2016<\/span><\/p>\n<p><strong>CFNetwork Proxies<\/strong><\/p>\n<p>Available for:\u00a0iPhone 5 and later, iPad 4th generation and later, iPod touch 6th generation and later<\/p>\n<p>Impact: An attacker in a privileged network position may be able to leak sensitive user information<\/p>\n<p>Description: A phishing issue existed in the handling of proxy credentials. This issue was addressed by removing unsolicited proxy password authentication prompts.<\/p>\n<p>CVE-2016-7579: Jerry Decime<\/p>\n<p><strong>Contacts<\/strong><\/p>\n<p>Available for: iPhone 5 and later, iPad 4th generation and later, iPod touch 6th generation and later<\/p>\n<p>Impact: An application may be able to maintain access to the Address Book after access is revoked in Settings<\/p>\n<p>Description: An access control issue in the Address Book was addressed through improved file-link validation.<\/p>\n<p>CVE-2016-4686: Razvan Deaconescu, Mihai Chiroiu (University POLITEHNICA of Bucharest); Luke Deshotels, William Enck (North Carolina State University); Lucas Vincenzo Davi, Ahmad-Reza Sadeghi (TU Darmstadt)<\/p>\n<p><strong>CoreGraphics<\/strong><\/p>\n<p>Available for: iPhone 5 and later, iPad 4th generation and later, iPod touch 6th generation and later<\/p>\n<p>Impact: Viewing a maliciously crafted JPEG file may lead to arbitrary code execution<\/p>\n<p>Description: A memory corruption issue was addressed through improved memory handling.<\/p>\n<p>CVE-2016-4673: Marco Grassi (@marcograss) of KeenLab (@keen_lab), Tencent<\/p>\n<p><strong>FaceTime<\/strong><\/p>\n<p>Available for: iPhone 5 and later, iPad 4th generation and later, iPod touch 6th generation and later<\/p>\n<p>Impact: An attacker in a privileged network position may be able to cause a relayed call to continue transmitting audio while appearing as if the call terminated<\/p>\n<p>Description: User interface inconsistencies existed in the handling of relayed calls. These issues were addressed through improved FaceTime display logic.<\/p>\n<p>CVE-2016-4635: Martin Vigo (@martin_vigo) of salesforce.com<\/p>\n<p><strong>FontParser<\/strong><\/p>\n<p>Available for: iPhone 5 and later, iPad 4th generation and later, iPod touch 6th generation and later<\/p>\n<p>Impact: Parsing a maliciously crafted font may disclose sensitive user information<\/p>\n<p>Description: An out-of-bounds read was addressed through improved bounds checking.<\/p>\n<p>CVE-2016-4660: Ke Liu of Tencent&#8217;s Xuanwu Lab<\/p>\n<p><strong>Kernel<\/strong><\/p>\n<p>Available for: iPhone 5 and later, iPad 4th generation and later, iPod touch 6th generation and later<\/p>\n<p>Impact: An application may be able to disclose kernel memory<\/p>\n<p>Description: A validation issue was addressed through improved input sanitization.<\/p>\n<p>CVE-2016-4680: Max Bazaliy of Lookout and in7egral<\/p>\n<p><strong>libarchive<\/strong><\/p>\n<p>Available for: iPhone 5 and later, iPad 4th generation and later, iPod touch 6th generation and later<\/p>\n<p>Impact: A malicious archive may be able to overwrite arbitrary files<\/p>\n<p>Description: An issue existed within the path validation logic for symlinks. This issue was addressed through improved path sanitization.<\/p>\n<p>CVE-2016-4679: Omer Medan of enSilo Ltd<\/p>\n<p><strong>libxpc<\/strong><\/p>\n<p>Available for: iPhone 5 and later, iPad 4th generation and later, iPod touch 6th generation and later<\/p>\n<p>Impact: An application may be able to execute arbitrary code with root privileges<\/p>\n<p>Description: A logic issue was addressed through additional restrictions.<\/p>\n<p>CVE-2016-4675: Ian Beer of Google Project Zero<\/p>\n<p><strong>Sandbox Profiles<\/strong><\/p>\n<p>Available for: iPhone 5 and later, iPad 4th generation and later, iPod touch 6th generation and later<\/p>\n<p>Impact: An application may be able to retrieve metadata of photo directories<\/p>\n<p>Description: An access issue was addressed through additional sandbox restrictions on third party applications.<\/p>\n<p>CVE-2016-4664: Razvan Deaconescu, Mihai Chiroiu (University POLITEHNICA of Bucharest); Luke Deshotels, William Enck (North Carolina State University); Lucas Vincenzo Davi, Ahmad-Reza Sadeghi (TU Darmstadt)<\/p>\n<p><strong>Sandbox Profiles<\/strong><\/p>\n<p>Available for: iPhone 5 and later, iPad 4th generation and later, iPod touch 6th generation and later<\/p>\n<p>Impact: An application may be able to retrieve metadata of audio recording directories<\/p>\n<p>Description: An access issue was addressed through additional sandbox restrictions on third party applications.<\/p>\n<p>CVE-2016-4665: Razvan Deaconescu, Mihai Chiroiu (University POLITEHNICA of Bucharest); Luke Deshotels, William Enck (North Carolina State University); Lucas Vincenzo Davi, Ahmad-Reza Sadeghi (TU Darmstadt)<\/p>\n<p><strong>Security<\/strong><\/p>\n<p>Available for: iPhone 5 and later, iPad 4th generation and later, iPod touch 6th generation and later<\/p>\n<p>Impact: A local attacker can observe the length of a login password when a user logs in<\/p>\n<p>Description: A logging issue existed in the handling of passwords. This issue was addressed by removing password length logging.<\/p>\n<p>CVE-2016-4670: an anonymous researcher<\/p>\n<p><strong>System Boot<\/strong><\/p>\n<p>Available for: iPhone 5 and later, iPad 4th generation and later, iPod touch 6th generation and later<\/p>\n<p>Impact: A local user may be able to cause an unexpected system termination or arbitrary code execution in the kernel<\/p>\n<p>Description: Multiple input validation issues existed in MIG generated code. These issues were addressed through improved validation.<\/p>\n<p>CVE-2016-4669: Ian Beer of Google Project Zero<\/p>\n<p><strong>WebKit<\/strong><\/p>\n<p>Available for: iPhone 5 and later, iPad 4th generation and later, iPod touch 6th generation and later<\/p>\n<p>Impact: Processing maliciously crafted web content may lead to arbitrary code execution<\/p>\n<p>Description: Multiple memory corruption issues were addressed through improved memory handling.<\/p>\n<p>CVE-2016-4677:\u00a0Anonymous working with Trend Micro Zero Day Initiative<\/p>\n<\/div>\n<\/article>\n<\/section>\n<p>The update can be downloaded over the air by going to<strong> Settings <\/strong>&gt;<strong> General <\/strong>&gt;<strong> Software Update.\u00a0<\/strong>You can also connect your iOS device to your Mac and let iTunes do the update for you.<\/p>\n<h3>tvOS 10.0.1<\/h3>\n<p>A combined 10 security issues were addressed in tvOS 10.0.1, mostly the same as those addressed in iOS. The full list of security fixes can be seen below or by visiting\u00a0<a href=\"https:\/\/support.apple.com\/en-us\/HT207270\" target=\"_blank\">the Apple website<\/a>.<\/p>\n<span class=\"collapseomatic \" id=\"id69da487c4eea2\"  tabindex=\"0\" title=\"trigger textClick here to see the full list of tvOS 10.0.1 security fixes\"    >trigger textClick here to see the full list of tvOS 10.0.1 security fixes<\/span><div id=\"target-id69da487c4eea2\" class=\"collapseomatic_content \">\n<h2>tvOS 10.0.1<\/h2>\n<p><span class=\"note\">Released October 24, 2016<\/span><\/p>\n<p><strong>CFNetwork Proxies<\/strong><\/p>\n<p>Available for:\u00a0Apple TV (4th generation)<\/p>\n<p>Impact: An attacker in a privileged network position may be able to leak sensitive user information<\/p>\n<p>Description: A phishing issue existed in the handling of proxy credentials. This issue was addressed by removing unsolicited proxy password authentication prompts.<\/p>\n<p>CVE-2016-7579: Jerry Decime<\/p>\n<p><strong>CoreGraphics<\/strong><\/p>\n<p>Available for: Apple TV (4th generation)<\/p>\n<p>Impact: Viewing a maliciously crafted JPEG file may lead to arbitrary code execution<\/p>\n<p>Description: A memory corruption issue was addressed through improved memory handling.<\/p>\n<p>CVE-2016-4673: Marco Grassi (@marcograss) of KeenLab (@keen_lab), Tencent<\/p>\n<p><strong>FontParser<\/strong><\/p>\n<p>Available for: Apple TV (4th generation)<\/p>\n<p>Impact: Parsing a maliciously crafted font may disclose sensitive user information<\/p>\n<p>Description: An out-of-bounds read was addressed through improved bounds checking.<\/p>\n<p>CVE-2016-4660: Ke Liu of Tencent&#8217;s Xuanwu Lab<\/p>\n<p><strong>Kernel<\/strong><\/p>\n<p>Available for: Apple TV (4th generation)<\/p>\n<p>Impact: An application may be able to disclose kernel memory<\/p>\n<p>Description: A validation issue was addressed through improved input sanitization.<\/p>\n<p>CVE-2016-4680: Max Bazaliy of Lookout and in7egral<\/p>\n<p><strong>libarchive<\/strong><\/p>\n<p>Available for: Apple TV (4th generation)<\/p>\n<p>Impact: A malicious archive may be able to overwrite arbitrary files<\/p>\n<p>Description: An issue existed within the path validation logic for symlinks. This issue was addressed through improved path sanitization.<\/p>\n<p>CVE-2016-4679: Omer Medan of enSilo Ltd<\/p>\n<p><strong>libxpc<\/strong><\/p>\n<p>Available for: Apple TV (4th generation)<\/p>\n<p>Impact: An application may be able to execute arbitrary code with root privileges<\/p>\n<p>Description: A logic issue was addressed through additional restrictions.<\/p>\n<p>CVE-2016-4675: Ian Beer of Google Project Zero<\/p>\n<p><strong>Sandbox Profiles<\/strong><\/p>\n<p>Available for: Apple TV (4th generation)<\/p>\n<p>Impact: An application may be able to retrieve metadata of photo directories<\/p>\n<p>Description: An access issue was addressed through additional sandbox restrictions on third party applications.<\/p>\n<p>CVE-2016-4664: Razvan Deaconescu, Mihai Chiroiu (University POLITEHNICA of Bucharest); Luke Deshotels, William Enck (North Carolina State University); Lucas Vincenzo Davi, Ahmad-Reza Sadeghi (TU Darmstadt)<\/p>\n<p><strong>Sandbox Profiles<\/strong><\/p>\n<p>Available for: Apple TV (4th generation)<\/p>\n<p>Impact: An application may be able to retrieve metadata of audio recording directories<\/p>\n<p>Description: An access issue was addressed through additional sandbox restrictions on third party applications.<\/p>\n<p>CVE-2016-4665: Razvan Deaconescu, Mihai Chiroiu (University POLITEHNICA of Bucharest); Luke Deshotels, William Enck (North Carolina State University); Lucas Vincenzo Davi, Ahmad-Reza Sadeghi (TU Darmstadt)<\/p>\n<p><strong>System Boot<\/strong><\/p>\n<p>Available for: Apple TV (4th generation)<\/p>\n<p>Impact: A local user may be able to cause an unexpected system termination or arbitrary code execution in the kernel<\/p>\n<p>Description: Multiple input validation issues existed in MIG generated code. These issues were addressed through improved validation.<\/p>\n<p>CVE-2016-4669: Ian Beer of Google Project Zero<\/p>\n<p><strong>WebKit<\/strong><\/p>\n<p>Available for: Apple TV (4th generation)<\/p>\n<p>Impact: Processing maliciously crafted web content may lead to arbitrary code execution<\/p>\n<p>Description: Multiple memory corruption issues were addressed through improved memory handling.<\/p>\n<p>CVE-2016-4677:\u00a0Anonymous working with Trend Micro&#8217;s Zero Day Initiative<\/p>\n<\/div>\n<p>The update can be downloaded directly from the Apple TV by going to <strong>Settings<\/strong> &gt; <strong>System<\/strong> &gt; <strong>Update Software<\/strong>.<\/p>\n<h3>watchOS 3.1<\/h3>\n<p>Listed as an update that includes improvements and bug fixes.<\/p>\n<ul>\n<li>New option to replay bubble and full screen effects in Messages<\/li>\n<li>Messages effects can play with Reduce Motion enabled<\/li>\n<li>Fixes an issue that could cause the notification for Timer complete to be delivered twice<\/li>\n<li>Resolves an issue that could prevent Apple Watch Series 2 from fully charging<\/li>\n<li>Resolves an issue where Activity rings may disappear from the watch face<\/li>\n<li>Fixes an issue that prevented Force Touch options from appearing in some third-party apps<\/li>\n<\/ul>\n<p>The update also includes 8 security fixes, which are the same as those addressed in iOS 10.1.\u00a0The full list of security fixes can be seen below or by visiting\u00a0<a href=\"https:\/\/support.apple.com\/en-us\/HT207269\" target=\"_blank\">the Apple website<\/a>.<\/p>\n<span class=\"collapseomatic \" id=\"id69da487c4eef2\"  tabindex=\"0\" title=\"Click here to see the full list of watchOS 3.1 security fixes\"    >Click here to see the full list of watchOS 3.1 security fixes<\/span><div id=\"target-id69da487c4eef2\" class=\"collapseomatic_content \">\n<h2>watchOS 3.1<\/h2>\n<p><span class=\"note\">Released October 24, 2016<\/span><\/p>\n<p><strong>CoreGraphics<\/strong><\/p>\n<p>Available for: All Apple Watch models<\/p>\n<p>Impact: Viewing a maliciously crafted JPEG file may lead to arbitrary code execution<\/p>\n<p>Description: A memory corruption issue was addressed through improved memory handling.<\/p>\n<p>CVE-2016-4673: Marco Grassi (@marcograss) of KeenLab (@keen_lab), Tencent<\/p>\n<p><strong>FontParser<\/strong><\/p>\n<p>Available for: All Apple Watch models<\/p>\n<p>Impact: Parsing a maliciously crafted font may disclose sensitive user information<\/p>\n<p>Description: An out-of-bounds read was addressed through improved bounds checking.<\/p>\n<p>CVE-2016-4660: Ke Liu of Tencent&#8217;s Xuanwu Lab<\/p>\n<p><strong>Kernel<\/strong><\/p>\n<p>Available for: All Apple Watch models<\/p>\n<p>Impact: An application may be able to disclose kernel memory<\/p>\n<p>Description: A validation issue was addressed through improved input sanitization.<\/p>\n<p>CVE-2016-4680: Max Bazaliy of Lookout and in7egral<\/p>\n<p><strong>libarchive<\/strong><\/p>\n<p>Available for: All Apple Watch models<\/p>\n<p>Impact: A malicious archive may be able to overwrite arbitrary files<\/p>\n<p>Description: An issue existed within the path validation logic for symlinks. This issue was addressed through improved path sanitization.<\/p>\n<p>CVE-2016-4679: Omer Medan of enSilo Ltd<\/p>\n<p><strong>libxpc<\/strong><\/p>\n<p>Available for: All Apple Watch models<\/p>\n<p>Impact: An application may be able to execute arbitrary code with root privileges<\/p>\n<p>Description: A logic issue was addressed through additional restrictions.<\/p>\n<p>CVE-2016-4675: Ian Beer of Google Project Zero<\/p>\n<p><strong>Sandbox Profiles<\/strong><\/p>\n<p>Available for: All Apple Watch models<\/p>\n<p>Impact: An application may be able to retrieve metadata of photo directories<\/p>\n<p>Description: An access issue was addressed through additional sandbox restrictions on third party applications.<\/p>\n<p>CVE-2016-4664: Razvan Deaconescu, Mihai Chiroiu (University POLITEHNICA of Bucharest); Luke Deshotels, William Enck (North Carolina State University); Lucas Vincenzo Davi, Ahmad-Reza Sadeghi (TU Darmstadt)<\/p>\n<p><strong>Sandbox Profiles<\/strong><\/p>\n<p>Available for: All Apple Watch models<\/p>\n<p>Impact: An application may be able to retrieve metadata of audio recording directories<\/p>\n<p>Description: An access issue was addressed through additional sandbox restrictions on third party applications.<\/p>\n<p>CVE-2016-4665: Razvan Deaconescu, Mihai Chiroiu (University POLITEHNICA of Bucharest); Luke Deshotels, William Enck (North Carolina State University); Lucas Vincenzo Davi, Ahmad-Reza Sadeghi (TU Darmstadt)<\/p>\n<p><strong>System Boot<\/strong><\/p>\n<p>Available for: All Apple Watch models<\/p>\n<p>Impact: A local user may be able to cause an unexpected system termination or arbitrary code execution in the kernel<\/p>\n<p>Description: Multiple input validation issues existed in MIG generated code. These issues were addressed through improved validation.<\/p>\n<p>CVE-2016-4669: Ian Beer of Google Project Zero<\/p>\n<\/div>\n<p>The update can be installed\u00a0by connecting the watch to its charger then on the iPhone open the <strong>Apple Watch app<\/strong> &gt; <strong>My Watch tab<\/strong> &gt; <strong>General<\/strong> &gt; <strong>Software Update<\/strong>.<\/p>\n<h3>Safari 10.0.1<\/h3>\n<p>Available for OS X Yosemite 10.10.5, OS X El Capitan 10.11.6 and macOS Sierra 10.12 and fixes 3 WebKit vulnerabilities. Those 3 vulnerabilities were enough for Apple to push out this update as they address arbitrary code execution and the disclosure of sensitive user information if a maliciously crafted website is visited.\u00a0The full details\u00a0of the security fixes can be seen below or by visiting\u00a0<a href=\"https:\/\/support.apple.com\/en-us\/HT207272\" target=\"_blank\">the Apple website<\/a>.<\/p>\n<span class=\"collapseomatic \" id=\"id69da487c4ef39\"  tabindex=\"0\" title=\"Click here to see the full list of Safari 10.0.1 security fixes\"    >Click here to see the full list of Safari 10.0.1 security fixes<\/span><div id=\"target-id69da487c4ef39\" class=\"collapseomatic_content \">\n<h2>Safari 10.0.1<\/h2>\n<p><span class=\"note\">Released October 24, 2016<\/span><\/p>\n<p><strong>WebKit<\/strong><\/p>\n<p>Available for: OS X Yosemite v10.10.5, OS X El Capitan v10.11.6, and macOS Sierra 10.12<\/p>\n<p>Impact: Processing maliciously crafted web content may lead to arbitrary code execution<\/p>\n<p>Description: Multiple memory corruption issues were addressed through improved memory handling.<\/p>\n<p>CVE-2016-4666: Apple<\/p>\n<p><strong>WebKit<\/strong><\/p>\n<p>Available for: OS X Yosemite v10.10.5, OS X El Capitan v10.11.6, and macOS Sierra 10.12<\/p>\n<p>Impact: Processing maliciously crafted web content may lead to the disclosure of sensitive user information<\/p>\n<p>Description: A cross-origin issue existed with location attributes. This was addressed through improved tracking of location attributes across origins.<\/p>\n<p>CVE-2016-4676: Apple<\/p>\n<p><strong>WebKit<\/strong><\/p>\n<p>Available for: OS X Yosemite v10.10.5, OS X El Capitan v10.11.6, and macOS Sierra 10.12<\/p>\n<p>Impact: Processing maliciously crafted web content may lead to arbitrary code execution<\/p>\n<p>Description: Multiple memory corruption issues were addressed through improved memory handling.<\/p>\n<p>CVE-2016-4677:\u00a0Anonymous working with Trend Micro&#8217;s Zero Day Initiative<\/p>\n<\/div>\n<p>The update can be downloaded by going to the<strong>\u00a0App Store\u00a0<\/strong>&gt;<strong>\u00a0Updates\u00a0<\/strong>tab.\u00a0It will be visible for Yosemite and El Capitan users as an available update, but if current Sierra users want it they will have to install the before mentioned 10.12.1 update which has the Safari security fixes built in.<\/p>\n<p>Before installing any updates, we recommend\u00a0that you\u00a0backup your data and just in case something falls afoul during the update process.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; Today, Apple released software updates with security fixes for just about all of its products: macOS, iOS, watchOS, tvOS and Safari. Apple&#8217;s\u00a0security updates are available for all Apple Watch models, iPhone 5 and later, iPad (4th generation and later), iPod touch (6th generation and later), Apple TV (4th generation), OS X Yosemite 10.10.5, OS [&hellip;]<\/p>\n","protected":false},"author":79,"featured_media":58906,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[5],"tags":[3160,3157,3169,3163,3166],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"&nbsp; Today, Apple released software updates with security fixes for just about all of its products: macOS, iOS, watchOS, tvOS and Safari.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-sierra-10-12-1-and-more-with-security-fixes\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apple Releases macOS Sierra 10.12.1 and More with Security Fixes - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"&nbsp; Today, Apple released software updates with security fixes for just about all of its products: macOS, iOS, watchOS, tvOS and Safari.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-sierra-10-12-1-and-more-with-security-fixes\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-10-24T22:55:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-03-20T20:04:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/Apple-Security-Updates.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jay Vrijenhoek\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"17 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-sierra-10-12-1-and-more-with-security-fixes\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/Apple-Security-Updates.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/Apple-Security-Updates.jpg\",\"width\":400,\"height\":260,\"caption\":\"Apple Security Updates\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-sierra-10-12-1-and-more-with-security-fixes\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-sierra-10-12-1-and-more-with-security-fixes\/\",\"name\":\"Apple Releases macOS Sierra 10.12.1 and More with Security Fixes - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-sierra-10-12-1-and-more-with-security-fixes\/#primaryimage\"},\"datePublished\":\"2016-10-24T22:55:56+00:00\",\"dateModified\":\"2017-03-20T20:04:08+00:00\",\"description\":\"&nbsp; Today, Apple released software updates with security fixes for just about all of its products: macOS, iOS, watchOS, tvOS and Safari.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-sierra-10-12-1-and-more-with-security-fixes\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-sierra-10-12-1-and-more-with-security-fixes\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-sierra-10-12-1-and-more-with-security-fixes\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Apple Releases macOS Sierra 10.12.1 and More with Security Fixes\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-sierra-10-12-1-and-more-with-security-fixes\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-sierra-10-12-1-and-more-with-security-fixes\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0\"},\"headline\":\"Apple Releases macOS Sierra 10.12.1 and More with Security Fixes\",\"datePublished\":\"2016-10-24T22:55:56+00:00\",\"dateModified\":\"2017-03-20T20:04:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-sierra-10-12-1-and-more-with-security-fixes\/#webpage\"},\"wordCount\":3501,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-sierra-10-12-1-and-more-with-security-fixes\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/Apple-Security-Updates.jpg\",\"keywords\":[\"iOS 10.1\",\"macOS 10.12.1\",\"Safari 10.0.1\",\"tvOS 10.0.1\",\"watchOS 3.1\"],\"articleSection\":[\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-sierra-10-12-1-and-more-with-security-fixes\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0\",\"name\":\"Jay Vrijenhoek\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g\",\"caption\":\"Jay Vrijenhoek\"},\"description\":\"Jay Vrijenhoek is an IT consultant with a passion for Mac security research.\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/jay-vrijenhoek\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"&nbsp; Today, Apple released software updates with security fixes for just about all of its products: macOS, iOS, watchOS, tvOS and Safari.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-sierra-10-12-1-and-more-with-security-fixes\/","og_locale":"en_US","og_type":"article","og_title":"Apple Releases macOS Sierra 10.12.1 and More with Security Fixes - The Mac Security Blog","og_description":"&nbsp; Today, Apple released software updates with security fixes for just about all of its products: macOS, iOS, watchOS, tvOS and Safari.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-sierra-10-12-1-and-more-with-security-fixes\/","og_site_name":"The Mac Security Blog","article_published_time":"2016-10-24T22:55:56+00:00","article_modified_time":"2017-03-20T20:04:08+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/Apple-Security-Updates.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jay Vrijenhoek","Est. reading time":"17 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-sierra-10-12-1-and-more-with-security-fixes\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/Apple-Security-Updates.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/Apple-Security-Updates.jpg","width":400,"height":260,"caption":"Apple Security Updates"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-sierra-10-12-1-and-more-with-security-fixes\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-sierra-10-12-1-and-more-with-security-fixes\/","name":"Apple Releases macOS Sierra 10.12.1 and More with Security Fixes - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-sierra-10-12-1-and-more-with-security-fixes\/#primaryimage"},"datePublished":"2016-10-24T22:55:56+00:00","dateModified":"2017-03-20T20:04:08+00:00","description":"&nbsp; Today, Apple released software updates with security fixes for just about all of its products: macOS, iOS, watchOS, tvOS and Safari.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-sierra-10-12-1-and-more-with-security-fixes\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-sierra-10-12-1-and-more-with-security-fixes\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-sierra-10-12-1-and-more-with-security-fixes\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Apple Releases macOS Sierra 10.12.1 and More with Security Fixes"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-sierra-10-12-1-and-more-with-security-fixes\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-sierra-10-12-1-and-more-with-security-fixes\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0"},"headline":"Apple Releases macOS Sierra 10.12.1 and More with Security Fixes","datePublished":"2016-10-24T22:55:56+00:00","dateModified":"2017-03-20T20:04:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-sierra-10-12-1-and-more-with-security-fixes\/#webpage"},"wordCount":3501,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-sierra-10-12-1-and-more-with-security-fixes\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/Apple-Security-Updates.jpg","keywords":["iOS 10.1","macOS 10.12.1","Safari 10.0.1","tvOS 10.0.1","watchOS 3.1"],"articleSection":["Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-sierra-10-12-1-and-more-with-security-fixes\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0","name":"Jay Vrijenhoek","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g","caption":"Jay Vrijenhoek"},"description":"Jay Vrijenhoek is an IT consultant with a passion for Mac security research.","url":"https:\/\/www.intego.com\/mac-security-blog\/author\/jay-vrijenhoek\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/Apple-Security-Updates.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-fhi","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/58732"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/79"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=58732"}],"version-history":[{"count":24,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/58732\/revisions"}],"predecessor-version":[{"id":64192,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/58732\/revisions\/64192"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/58906"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=58732"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=58732"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=58732"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}