Superduper For Os X 10.9.5
This update can be downloaded and installed using Software Update or from the Apple Support website.
For the protection of our customers, Apple does not disclose, discuss, or confirm security issues until a full investigation has occurred and any necessary patches or releases are available. To learn more about Apple Product Security, see the Apple Product Security website.
MacBook Pro late 2011 running OS X 10.9.5. Joined Jan 23, 2009 Messages 7,603. Have two Time Machines, 2 SuperDuper! Clones and an EHD with copies of my main. OS X Mavericks (version 10.9) is the tenth major release of macOS, Apple Inc.' S desktop and server operating system for Macintosh computers. OS X Mavericks was announced on June 10, 2013, at WWDC 2013, and was released on October 22, 2013 worldwide. The update emphasized battery life, Finder improvements, other improvements for power users, and continued iCloud integration, as well as.
For information about the Apple Product Security PGP Key, see How to use the Apple Product Security PGP Key.
Where possible, CVE IDs are used to reference the vulnerabilities for further information.
To learn about other Security Updates, see Apple Security Updates.
Note: OS X Mavericks v10.9.5 includes the security content of Safari 7.0.6.
OS X Mavericks v10.9.5 and Security Update 2014-004
apache_mod_php
Available for: OS X Mavericks v10.9 to v10.9.4
Impact: Multiple vulnerabilities in PHP 5.4.24
Description: Multiple vulnerabilities existed in PHP 5.4.24, the most serious of which may have led to arbitrary code execution. This update addresses the issues by updating PHP to version 5.4.30
CVE-ID
CVE-2013-7345
CVE-2014-0185
CVE-2014-0207
CVE-2014-0237
CVE-2014-0238
CVE-2014-1943
CVE-2014-2270
CVE-2014-3478
CVE-2014-3479
CVE-2014-3480
CVE-2014-3487
CVE-2014-3515
CVE-2014-3981
CVE-2014-4049
Super Duper
Bluetooth
Available for: OS X Mavericks v10.9 to v10.9.4
Impact: A malicious application may be able to execute arbitrary code with system privileges
Description: A validation issue existed in the handling of a Bluetooth API call. This issue was addressed through improved bounds checking.
CVE-ID
CVE-2014-4390 : Ian Beer of Google Project Zero
CoreGraphics
Available for: OS X Mavericks v10.9 to v10.9.4
Impact: Opening a maliciously crafted PDF file may lead to an unexpected application termination or an information disclosure
Description: An out of bounds memory read existed in the handling of PDF files. This issue was addressed through improved bounds checking.
CVE-ID
CVE-2014-4378 : Felipe Andres Manzano of Binamuse VRT working with the iSIGHT Partners GVP Program
CoreGraphics
Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks v10.9 to v10.9.4
Impact: Opening a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution
Description: An integer overflow existed in the handling of PDF files. This issue was addressed through improved bounds checking.
CVE-ID
CVE-2014-4377 : Felipe Andres Manzano of Binamuse VRT working with the iSIGHT Partners GVP Program
Foundation
Available for: OS X Mavericks v10.9 to v10.9.4
Impact: An application using NSXMLParser may be misused to disclose information
Description: An XML External Entity issue existed in NSXMLParser's handling of XML. This issue was addressed by not loading external entities across origins.
CVE-ID
CVE-2014-4374 : George Gal of VSR (http://www.vsecurity.com/)
Intel Graphics Driver
Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9 to v10.9.4
Impact: Compiling untrusted GLSL shaders may lead to an unexpected application termination or arbitrary code execution
Description: A user-space buffer overflow existed in the shader compiler. This issue was addressed through improved bounds checking.
CVE-ID
CVE-2014-4393 : Apple
Intel Graphics Driver
Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9 to v10.9.4
Impact: A malicious application may be able to execute arbitrary code with system privileges
Description: Multiple validation issues existed in some integrated graphics driver routines. These issues were addressed through improved bounds checking.
CVE-ID
CVE-2014-4394 : Ian Beer of Google Project Zero
CVE-2014-4395 : Ian Beer of Google Project Zero
CVE-2014-4396 : Ian Beer of Google Project Zero
CVE-2014-4397 : Ian Beer of Google Project Zero
CVE-2014-4398 : Ian Beer of Google Project Zero
CVE-2014-4399 : Ian Beer of Google Project Zero
CVE-2014-4400 : Ian Beer of Google Project Zero
CVE-2014-4401 : Ian Beer of Google Project Zero
CVE-2014-4416 : Ian Beer of Google Project Zero
IOAcceleratorFamily
Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9 to v10.9.4
Impact: A malicious application may be able to execute arbitrary code with system privileges
Description: A null pointer dereference existed in the handling of IOKit API arguments. This issue was addressed through improved validation of IOKit API arguments.
CVE-ID
CVE-2014-4376 : Ian Beer of Google Project Zero
IOAcceleratorFamily
Available for: OS X Mavericks v10.9 to v10.9.4
Impact: A malicious application may be able to execute arbitrary code with system privileges
Description: An out-of-bounds read issue existed in the handling of an IOAcceleratorFamily function. This issue was addressed through improved bounds checking.
CVE-ID
CVE-2014-4402 : Ian Beer of Google Project Zero
IOHIDFamily
Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9 to v10.9.4
Impact: A local user can read kernel pointers, which can be used to bypass kernel address space layout randomization
Description: An out-of-bounds read issue existed in the handling of an IOHIDFamily function. This issue was addressed through improved bounds checking.
CVE-ID
CVE-2014-4379 : Ian Beer of Google Project Zero
IOKit
Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9 to v10.9.4
Impact: A malicious application may be able to execute arbitrary code with system privileges
Description: A validation issue existed in the handling of certain metadata fields of IODataQueue objects. This issue was addressed through improved validation of metadata.
CVE-ID
CVE-2014-4388 : @PanguTeam
IOKit
Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9 to v10.9.4
Impact: A malicious application may be able to execute arbitrary code with system privileges
Description: An integer overflow existed in the handling of IOKit functions. This issue was addressed through improved bounds checking.
CVE-ID
CVE-2014-4389 : Ian Beer of Google Project Zero
Kernel
Available for: OS X Mavericks v10.9 to v10.9.4
Impact: A local user can infer kernel addresses and bypass kernel address space layout randomization
Description: In some cases, the CPU Global Descriptor Table was allocated at a predictable address. This issue was addressed through always allocating the Global Descriptor Table at random addresses.
CVE-ID
CVE-2014-4403 : Ian Beer of Google Project Zero
Libnotify
Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9 to v10.9.4
Impact: A malicious application may be able to execute arbitrary code with root privileges
Description: An out-of-bounds write issue existed in Libnotify. This issue was addressed through improved bounds checking
CVE-ID
CVE-2014-4381 : Ian Beer of Google Project Zero
OpenSSL
Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks v10.9 to v10.9.4
Impact: Multiple vulnerabilities in OpenSSL 0.9.8y, including one that may lead to arbitrary code execution
Description: Multiple vulnerabilities existed in OpenSSL 0.9.8y. This update was addressed by updating OpenSSL to version 0.9.8za.
CVE-ID
CVE-2014-0076
CVE-2014-0195
CVE-2014-0221
CVE-2014-0224
CVE-2014-3470
QT Media Foundation
Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks v10.9 to v10.9.4
Impact: Playing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution
Description: A memory corruption issue existed in the handling of RLE encoded movie files. This issue was addressed through improved bounds checking.
CVE-ID
CVE-2014-1391 : Fernando Munoz working with iDefense VCP, Tom Gallagher & Paul Bates working with HP's Zero Day Initiative
QT Media Foundation
Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks v10.9 to v10.9.4
Impact: Playing a maliciously crafted MIDI file may lead to an unexpected application termination or arbitrary code execution
Description: A buffer overflow existed in the handling of MIDI files. This issue was addressed through improved bounds checking.
CVE-ID
CVE-2014-4350 : s3tm3m working with HP's Zero Day Initiative
QT Media Foundation
Available for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, OS X Mavericks v10.9 to v10.9.4
Impact: Playing a maliciously crafted movie file may lead to an unexpected application termination or arbitrary code execution
Description: A memory corruption issue existed in the handling of the 'mvhd' atoms. This issue was addressed through improved bounds checking.
CVE-ID
CVE-2014-4979 : Andrea Micalizzi aka rgod working with HP's Zero Day Initiative
ruby
Available for: OS X Mavericks v10.9 to v10.9.4
Impact: A remote attacker may be able to cause arbitrary code execution
Description: A heap buffer overflow existed in LibYAML's handling of percent-encoded characters in a URI. This issue was addressed through improved bounds checking. This update addresses the issues by updating LibYAML to version 0.1.6
CVE-ID
CVE-2014-2525
Super Duper For Os X 10 9 5 Free
Garoolgan
- Joined
- Apr 26, 2008
- Messages
- 48
- Reaction score
- 0
- Points
- 6
Superduper For Os X 10.9.5
I was having problems with TM announcing that my disk was full so after erasing (using Mac OS Extended journaled), re-partitioning it with one partition and checking permissions etc. I set TM to backup to my 2TB external HD connected by Firewire. When the backup reaches within about 50Gb of the initially announced total this total keeps increasing so that TM never stops and I did let it run for 13 hours to be sure !
When I stopped TM the TM 'mask' (in Time Machine Preferences) announced latest Backup None, and the next of course none as I'd switched TM to off.
This sort of thing has happened before during the last few days, which is why I let it run all night to see what happened. The number of GB backed up never reaches the total, as the 'of GB' keeps increasing.
TM and CCC have been running for years (each on its' own external HDD, daisy chained together via firewire) without problem until very recently.
Having formatted and checked the external HDD I'm now supposing there's something wrong with the TM app?
Does anyone have any ideas?
--------------------------
Next Day:
I can't use Ctrl+R on booting as the App.Store doesn't give me access to upgrading/repairing Mavericks.
It seems that there is only one solution left: re-install Mavericks? I have Mavericks on a Flash Drive. Can I run Mavericks over Mavericks? What I mean is, whilst the Mac is running on Mavericks can I insert my flash drive with Mavericks on it and do an install? If I can, will that wipe everything or just repair the OS?
Thanks in advance for any help. - Garoolgan
MacBook Pro late 2011 running OS X 10.9.5