lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Mon, 14 May 2012 13:31:56 -0700
From: Apple Product Security <product-security-noreply@...ts.apple.com>
To: security-announce@...ts.apple.com
Subject: APPLE-SA-2012-05-14-1 Flashback Removal Security Update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

APPLE-SA-2012-05-14-1 Flashback Removal Security Update

Flashback Removal Security Update is now available and addresses the
following:

Malware removal
Available for:  Mac OS X v10.5 to v10.5.8
Impact:  A Flashback malware removal tool will be run
Description:  This update runs a malware removal tool that will
remove the most common variants of the Flashback malware. If the
Flashback malware is found, it presents a dialog notifying the user
that malware was removed. There is no indication to the user if
malware is not found.


Flashback Removal Security Update may be obtained from the Software
Update pane in System Preferences, or Apple's Software Downloads
web site: http://www.apple.com/support/downloads/

The download file is named: FlashbackRemovalUpdate.dmg
Its SHA-1 digest is: 64231192a3b6d0ac8b0fe61c6ea7be5c829cc9f9

Information will also be posted to the Apple Security Updates
web site: http://support.apple.com/kb/HT1222

This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/

-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.18 (Darwin)
Comment: GPGTools - http://gpgtools.org
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=Q/Oq
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ