[<prev] [next>] [day] [month] [year] [list]
Message-id: <05ECEED8-2322-4DE5-B082-9CF4FCAF8E79@lists.apple.com>
Date: Mon, 19 Feb 2018 13:53:24 -0800
From: Apple Product Security <product-security-noreply@...ts.apple.com>
To: security-announce@...ts.apple.com
Subject: [FD] APPLE-SA-2018-02-19-2 macOS High Sierra 10.13.3 Supplemental
Update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
APPLE-SA-2018-02-19-2 macOS High Sierra 10.13.3 Supplemental Update
macOS High Sierra 10.13.3 Supplemental Update is now available and
addresses the following:
CoreText
Available for: macOS High Sierra 10.13.3
Impact: Processing a maliciously crafted string may lead to heap
corruption
Description: A memory corruption issue was addressed through improved
input validation.
CVE-2018-4124: an anonymous researcher
Installation note:
macOS High Sierra 10.13.3 Supplemental Update may be obtained from
the Mac App Store or Apple's Software Downloads web site:
https://support.apple.com/downloads/
Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - http://gpgtools.org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=jxgk
-----END PGP SIGNATURE-----
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists