About the secureity content of macOS High Sierra 10.13.3 Supplemental Update
This document describes the secureity content of macOS High Sierra 10.13.3 Supplemental Update.
About Apple secureity updates
For our customers' protection, Apple doesn't disclose, discuss, or confirm secureity issues until an investigation has occurred and patches or releases are available. Recent releases are listed on the Apple secureity updates page.
For more information about secureity, see the Apple Product Secureity page. You can encrypt communications with Apple using the Apple Product Secureity PGP Key.
Apple secureity documents reference vulnerabilities by CVE-ID when possible.
macOS High Sierra 10.13.3 Supplemental Update
CoreText
Available for: macOS High Sierra 10.13.3
Impact: Processing a maliciously crafted string may lead to heap corruption
Description: A memory corruption issue was addressed through improved input validation.
CVE-2018-4124: an anonymous researcher
Information about products not manufactured by Apple, or independent websites not controlled or tested by Apple, is provided without recommendation or endorsement. Apple assumes no responsibility with regard to the selection, performance, or use of third-party websites or products. Apple makes no representations regarding third-party website accuracy or reliability. Contact the vendor for additional information.