-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

APPLE-SA-2018-02-19-2 macOS High Sierra 10.13.3 Supplemental Update

macOS High Sierra 10.13.3 Supplemental Update is now available and
addresses the following:

CoreText
Available for: macOS High Sierra 10.13.3
Impact: Processing a maliciously crafted string may lead to heap
corruption
Description: A memory corruption issue was addressed through improved
input validation.
CVE-2018-4124: an anonymous researcher

Installation note:

macOS High Sierra 10.13.3 Supplemental Update may be obtained from
the Mac App Store or Apple's Software Downloads web site:
https://support.apple.com/downloads/

Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222

This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - http://gpgtools.org
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=jxgk
-----END PGP SIGNATURE-----

 _______________________________________________
Do not post admin requests to the list. They will be ignored.
Security-announce mailing list      (Security-announce@lists.apple.com)
Help/Unsubscribe/Update your Subscription:
https://lists.apple.com/mailman/options/security-announce/archive%40mail-archive.com

This email sent to arch...@mail-archive.com

Reply via email to