[<prev] [next>] [day] [month] [year] [list]
Message-id: <C3F3E121-3C67-423E-A087-55287089B457@lists.apple.com>
Date: Thu, 07 Feb 2019 10:28:53 -0800
From: Apple Product Security via Fulldisclosure <fulldisclosure@...lists.org>
To: security-announce@...ts.apple.com
Subject: [FD] APPLE-SA-2019-2-07-2 macOS Mojave 10.14.3 Supplemental Update
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
APPLE-SA-2019-2-07-2 macOS Mojave 10.14.3 Supplemental Update
macOS Mojave 10.14.3 Supplemental Update is now available and
addresses the following:
FaceTime
Available for: macOS Mojave 10.14.3
Impact: The initiator of a Group FaceTime call may be able to cause
the recipient to answer
Description: A logic issue existed in the handling of Group FaceTime
calls. The issue was addressed with improved state management.
CVE-2019-6223: Grant Thompson of Catalina Foothills High School,
Daven Morris of Arlington, TX
Foundation
Available for: macOS Mojave 10.14.3
Impact: An application may be able to gain elevated privileges
Description: A memory corruption issue was addressed with improved
input validation.
CVE-2019-7286: an anonymous researcher, Clement Lecigne of Google
Threat Analysis Group, Ian Beer of Google Project Zero, and Samuel
Groß of Google Project Zero
Live Photos in FaceTime
Available for: macOS Mojave 10.14.3
Impact: A thorough security audit of the FaceTime service uncovered
an issue with Live Photos
Description: The issue was addressed with improved validation on the
FaceTime server.
CVE-2019-7288: Apple
Installation note:
macOS Mojave 10.14.3 Supplemental Update may be obtained from the Mac
App Store or Apple's Software Downloads web site:
https://support.apple.com/downloads/
Installing macOS Mojave 10.14.3 Supplemental Update on your Mac
updates the build number of macOS to 18D109. This build contains
the security content described in this article. If you update to
macOS Mojave 10.14.3 and your macOS build is not 18D109, make sure
you also install the Supplemental Update.
Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----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=5koL
-----END PGP SIGNATURE-----
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists