-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 APPLE-SA-2018-7-05-1 Wi-Fi Update for Boot Camp 6.4.0 Wi-Fi Update for Boot Camp 6.4.0 is now available and addresses the following: Wi-Fi Available for the following machines while running Boot Camp: MacBook (Late 2009 and later), MacBook Pro (Mid 2010 and later), MacBook Air (Late 2010 and later), Mac mini (Mid 2010 and later), iMac (Late 2009 and later), and Mac Pro (Mid 2010 and later) Impact: An attacker in Wi-Fi range may force nonce reuse in WPA unicast/PTK clients (Key Reinstallation Attacks - KRACK) Description: A logic issue existed in the handling of state transitions. This was addressed with improved state management. CVE-2017-13077: Mathy Vanhoef of the imec-DistriNet group at KU Leuven CVE-2017-13078: Mathy Vanhoef of the imec-DistriNet group at KU Leuven Wi-Fi Available for the following machines while running Boot Camp: MacBook (Late 2009 and later), MacBook Pro (Mid 2010 and later), MacBook Air (Late 2010 and later), Mac mini (Mid 2010 and later), iMac (Late 2009 and later), and Mac Pro (Mid 2010 and later) Impact: An attacker in Wi-Fi range may force nonce reuse in WPA multicast/GTK clients (Key Reinstallation Attacks - KRACK) Description: A logic issue existed in the handling of state transitions. This was addressed with improved state management. CVE-2017-13080: Mathy Vanhoef of the imec-DistriNet group at KU Leuven Installation note: Wi-Fi Update for Boot Camp 6.4.0 may be obtained from Apple Software Update for Windows. Information about using Apple Software Update for Windows is available at: https://support.apple.com/KB/HT208038 Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEfcwwPWJ3e0Ig26mf8ecVjteJiCYFAls+eK0ACgkQ8ecVjteJ iCZtWBAAyZFkY+MjJXSZMO6fr7tQdGHK+GZRlV3s7UUh6xFzz+FelguPLTDrnF8f +iVaO35ftkGh52rNdczRAM5oBmCEgM/PQKtqaxIv0SlINTwMgcGqPvZpbBP3d8iV Ow7yzmiVlpzHpvcDlkFLvo1jN1nPqXeyDiBW1tzQerc3RXJZsq6TZ+hZ4y4oaGJF YKf4cdMxiWge+iFQhAkYsoWoAvodLwNi6CQX8VHI1JqYpkoDM3DCwhjwnqmk3Yl9 VC5B8GWHhFHSAfWLz9zu9ffm+CgptGUcUxsEbbfWhIrsdgT/RFHklwfSWcPzgdfS JZWIgptzvQBCWa3bUszpRN9wcYbQCKV1ZpyMsFOesO7UKHIG4Z7+GaH5f8Dreu4j KLbJsCpKPBcP4SLm7yaC5Kjwl1BIYimnbcMSLBWLFHBhrXX0FypnOF4TUj7tNMmK 3IUzbf3GLuVFGiTAxPR7oqk/sFNIhjEM0AjtswSjYA5nfFRFkHxPQqn0E4jZ+HNP 3wKZIZ2U1qT/CHecFJ+W7J9XgG6t5HeHN14wkWwdxRBsB6DyMY48epXeoJPo9haT 0G1kCMfZFBHV2c7cct2pjbgCl8bzWcLZ7atT3GsQjdmQegzTPN9B8xSgB3Clv73f rlLE63BBmH/Ft5TpATTs+R0cF+lJEQm94h6Hl3NRm9o7665BuY0= =JpXa -----END PGP SIGNATURE-----