Superduper For Os X 10.9.5

This update can be downloaded and installed using Software Update or from the Apple Support website.

For the protection of our customers, Apple does not disclose, discuss, or confirm security issues until a full investigation has occurred and any necessary patches or releases are available. To learn more about Apple Product Security, see the Apple Product Security website.

MacBook Pro late 2011 running OS X 10.9.5. Joined Jan 23, 2009 Messages 7,603. Have two Time Machines, 2 SuperDuper! Clones and an EHD with copies of my main. OS X Mavericks (version 10.9) is the tenth major release of macOS, Apple Inc.' S desktop and server operating system for Macintosh computers. OS X Mavericks was announced on June 10, 2013, at WWDC 2013, and was released on October 22, 2013 worldwide. The update emphasized battery life, Finder improvements, other improvements for power users, and continued iCloud integration, as well as.

For information about the Apple Product Security PGP Key, see How to use the Apple Product Security PGP Key.

Where possible, CVE IDs are used to reference the vulnerabilities for further information.

To learn about other Security Updates, see Apple Security Updates.

Note: OS X Mavericks v10.9.5 includes the security content of Safari 7.0.6.

OS X Mavericks v10.9.5 and Security Update 2014-004

  • apache_mod_php

    Available for: OS X Mavericks v10.9 to v10.9.4

    Impact: Multiple vulnerabilities in PHP 5.4.24

    Description: Multiple vulnerabilities existed in PHP 5.4.24, the most serious of which may have led to arbitrary code execution. This update addresses the issues by updating PHP to version 5.4.30

    CVE-ID

    CVE-2013-7345

    CVE-2014-0185

    CVE-2014-0207

    CVE-2014-0237

    CVE-2014-0238

    CVE-2014-1943

    CVE-2014-2270

    CVE-2014-3478

    CVE-2014-3479

    CVE-2014-3480

    CVE-2014-3487

    CVE-2014-3515

    CVE-2014-3981

    CVE-2014-4049

Super Duper

  • Bluetooth

    Available for: OS X Mavericks v10.9 to v10.9.4

    Impact: A malicious application may be able to execute arbitrary code with system privileges

    Description: A validation issue existed in the handling of a Bluetooth API call. This issue was addressed through improved bounds checking.

    CVE-ID

    CVE-2014-4390 : Ian Beer of Google Project Zero

  • CoreGraphics

    Available for: OS X Mavericks v10.9 to v10.9.4

    Impact: Opening a maliciously crafted PDF file may lead to an unexpected application termination or an information disclosure

    Description: An out of bounds memory read existed in the handling of PDF files. This issue was addressed through improved bounds checking.

    CVE-ID

    CVE-2014-4378 : Felipe Andres Manzano of Binamuse VRT working with the iSIGHT Partners GVP Program

Superduper For Os X 10.9.5
  • CoreGraphics

    Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks v10.9 to v10.9.4

    Impact: Opening a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution

    Description: An integer overflow existed in the handling of PDF files. This issue was addressed through improved bounds checking.

    CVE-ID

    CVE-2014-4377 : Felipe Andres Manzano of Binamuse VRT working with the iSIGHT Partners GVP Program

  • Foundation

    Available for: OS X Mavericks v10.9 to v10.9.4

    Impact: An application using NSXMLParser may be misused to disclose information

    Description: An XML External Entity issue existed in NSXMLParser's handling of XML. This issue was addressed by not loading external entities across origins.

    CVE-ID

    CVE-2014-4374 : George Gal of VSR (http://www.vsecurity.com/)

  • Intel Graphics Driver

    Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9 to v10.9.4

    Impact: Compiling untrusted GLSL shaders may lead to an unexpected application termination or arbitrary code execution

    Description: A user-space buffer overflow existed in the shader compiler. This issue was addressed through improved bounds checking.

    CVE-ID

    CVE-2014-4393 : Apple

  • Intel Graphics Driver

    Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9 to v10.9.4

    Impact: A malicious application may be able to execute arbitrary code with system privileges

    Description: Multiple validation issues existed in some integrated graphics driver routines. These issues were addressed through improved bounds checking.

    CVE-ID

    CVE-2014-4394 : Ian Beer of Google Project Zero

    CVE-2014-4395 : Ian Beer of Google Project Zero

    CVE-2014-4396 : Ian Beer of Google Project Zero

    CVE-2014-4397 : Ian Beer of Google Project Zero

    CVE-2014-4398 : Ian Beer of Google Project Zero

    CVE-2014-4399 : Ian Beer of Google Project Zero

    CVE-2014-4400 : Ian Beer of Google Project Zero

    CVE-2014-4401 : Ian Beer of Google Project Zero

    CVE-2014-4416 : Ian Beer of Google Project Zero

  • IOAcceleratorFamily

    Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9 to v10.9.4

    Impact: A malicious application may be able to execute arbitrary code with system privileges

    Description: A null pointer dereference existed in the handling of IOKit API arguments. This issue was addressed through improved validation of IOKit API arguments.

    CVE-ID

    CVE-2014-4376 : Ian Beer of Google Project Zero

  • IOAcceleratorFamily

    Available for: OS X Mavericks v10.9 to v10.9.4

    Impact: A malicious application may be able to execute arbitrary code with system privileges

    Description: An out-of-bounds read issue existed in the handling of an IOAcceleratorFamily function. This issue was addressed through improved bounds checking.

    CVE-ID

    CVE-2014-4402 : Ian Beer of Google Project Zero

  • IOHIDFamily

    Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9 to v10.9.4

    Impact: A local user can read kernel pointers, which can be used to bypass kernel address space layout randomization

    Description: An out-of-bounds read issue existed in the handling of an IOHIDFamily function. This issue was addressed through improved bounds checking.

    CVE-ID

    CVE-2014-4379 : Ian Beer of Google Project Zero

  • IOKit

    Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9 to v10.9.4

    Impact: A malicious application may be able to execute arbitrary code with system privileges

    Description: A validation issue existed in the handling of certain metadata fields of IODataQueue objects. This issue was addressed through improved validation of metadata.

    CVE-ID

    CVE-2014-4388 : @PanguTeam

  • IOKit

    Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9 to v10.9.4

    Impact: A malicious application may be able to execute arbitrary code with system privileges

    Description: An integer overflow existed in the handling of IOKit functions. This issue was addressed through improved bounds checking.

    CVE-ID

    CVE-2014-4389 : Ian Beer of Google Project Zero

  • Kernel

    Available for: OS X Mavericks v10.9 to v10.9.4

    Impact: A local user can infer kernel addresses and bypass kernel address space layout randomization

    Description: In some cases, the CPU Global Descriptor Table was allocated at a predictable address. This issue was addressed through always allocating the Global Descriptor Table at random addresses.

    CVE-ID

    CVE-2014-4403 : Ian Beer of Google Project Zero

  • Libnotify

    Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9 to v10.9.4

    Impact: A malicious application may be able to execute arbitrary code with root privileges

    Description: An out-of-bounds write issue existed in Libnotify. This issue was addressed through improved bounds checking

    CVE-ID

    CVE-2014-4381 : Ian Beer of Google Project Zero

  • OpenSSL

    Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks v10.9 to v10.9.4

    Impact: Multiple vulnerabilities in OpenSSL 0.9.8y, including one that may lead to arbitrary code execution

    Description: Multiple vulnerabilities existed in OpenSSL 0.9.8y. This update was addressed by updating OpenSSL to version 0.9.8za.

    CVE-ID

    CVE-2014-0076

    CVE-2014-0195

    CVE-2014-0221

    CVE-2014-0224

    CVE-2014-3470

  • QT Media Foundation

    Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks v10.9 to v10.9.4

    Impact: Playing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution

    Description: A memory corruption issue existed in the handling of RLE encoded movie files. This issue was addressed through improved bounds checking.

    CVE-ID

    CVE-2014-1391 : Fernando Munoz working with iDefense VCP, Tom Gallagher & Paul Bates working with HP's Zero Day Initiative

  • QT Media Foundation

    Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks v10.9 to v10.9.4

    Impact: Playing a maliciously crafted MIDI file may lead to an unexpected application termination or arbitrary code execution

    Description: A buffer overflow existed in the handling of MIDI files. This issue was addressed through improved bounds checking.

    CVE-ID

    CVE-2014-4350 : s3tm3m working with HP's Zero Day Initiative

  • QT Media Foundation

    Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks v10.9 to v10.9.4

    Impact: Playing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution

    Description: A memory corruption issue existed in the handling of the 'mvhd' atoms. This issue was addressed through improved bounds checking.

    CVE-ID

    CVE-2014-4979 : Andrea Micalizzi aka rgod working with HP's Zero Day Initiative

  • ruby

    Available for: OS X Mavericks v10.9 to v10.9.4

    Impact: A remote attacker may be able to cause arbitrary code execution

    Description: A heap buffer overflow existed in LibYAML's handling of percent-encoded characters in a URI. This issue was addressed through improved bounds checking. This update addresses the issues by updating LibYAML to version 0.1.6

    CVE-ID

    CVE-2014-2525

Super Duper For Os X 10 9 5 Free

Garoolgan


Joined
Apr 26, 2008
Messages
48
Reaction score
0
Points
6

Superduper For Os X 10.9.5

Hello,
I was having problems with TM announcing that my disk was full so after erasing (using Mac OS Extended journaled), re-partitioning it with one partition and checking permissions etc. I set TM to backup to my 2TB external HD connected by Firewire. When the backup reaches within about 50Gb of the initially announced total this total keeps increasing so that TM never stops and I did let it run for 13 hours to be sure !
When I stopped TM the TM 'mask' (in Time Machine Preferences) announced latest Backup None, and the next of course none as I'd switched TM to off.
This sort of thing has happened before during the last few days, which is why I let it run all night to see what happened. The number of GB backed up never reaches the total, as the 'of GB' keeps increasing.
TM and CCC have been running for years (each on its' own external HDD, daisy chained together via firewire) without problem until very recently.
Having formatted and checked the external HDD I'm now supposing there's something wrong with the TM app?
Does anyone have any ideas?
--------------------------
Next Day:
I can't use Ctrl+R on booting as the App.Store doesn't give me access to upgrading/repairing Mavericks.
It seems that there is only one solution left: re-install Mavericks? I have Mavericks on a Flash Drive. Can I run Mavericks over Mavericks? What I mean is, whilst the Mac is running on Mavericks can I insert my flash drive with Mavericks on it and do an install? If I can, will that wipe everything or just repair the OS?
Thanks in advance for any help. - Garoolgan
MacBook Pro late 2011 running OS X 10.9.5