![]() ![]() ![]() MacOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra MacOS Sierra 10.12.6 and macOS High Sierra 10.13.6 Security Update 2019-002 High Sierra and Security Update 2019-002 Sierra This update has no published CVE entries. IPhone 6s and later, iPad Air 2 and later, iPad mini 4 and later, and iPod touch 7th generation ![]() IPhone 5s, iPhone 6, iPhone 6 Plus, iPad Air, iPad mini 2, iPad mini 3, and iPod touch 6th generation MacOS Mojave and macOS High Sierra, and included in macOS Catalina MacOS Catalina 10.15, macOS Mojave 10.14.6, macOS High Sierra 10.13.6 MacOS Catalina 10.15.2, Security Update 2019-002 Mojave, and Security Update 2019-007 High Sierra This issue was addressed by using an encrypted HTTPS connection to retrieve the contents.Windows 10 and later via the Microsoft StoreĪpple Watch Series 1, Apple Watch Series 2, Apple Watch Series 3, and Apple Watch Series 4 when paired to a device with iOS 12 installed Impact: An attacker in a privileged network position may be able to control the contents of the updates windowĭescription: The contents of the updates window were retrieved from the network using an unprotected HTTP connection. To learn about other security updates, see Apple security updates. Where possible, CVE IDs are used to reference the vulnerabilities for further information. To learn more about Apple Product Security, see the Apple Product Security website.įor information about the Apple Product Security PGP Key, see How to use the Apple Product Security PGP Key. This document describes the security content of Apple Software Update 2.2.įor the protection of our customers, Apple does not disclose, discuss, or confirm security issues until a full investigation has occurred and any necessary patches or releases are available. About the security content of Apple Software Update 2.2 ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |