-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 APPLE-SA-2020-05-26-9 iCloud for Windows 11.2 iCloud for Windows 11.2 is now available and addresses the following: ImageIO Available for: Windows 10 and later via the Microsoft Store Impact: Processing a maliciously crafted image may lead to arbitrary code execution Description: An out-of-bounds write issue was addressed with improved bounds checking. CVE-2020-9789: Wenchao Li of VARAS@IIE CVE-2020-9790: Xingwei Lin of Ant-financial Light-Year Security Lab ImageIO Available for: Windows 10 and later via the Microsoft Store Impact: Processing a maliciously crafted image may lead to arbitrary code execution Description: An out-of-bounds read was addressed with improved input validation. CVE-2020-3878: Samuel Groß of Google Project Zero SQLite Available for: Windows 10 and later via the Microsoft Store Impact: A malicious application may cause a denial of service or potentially disclose memory contents Description: An out-of-bounds read was addressed with improved bounds checking. CVE-2020-9794 WebKit Available for: Windows 10 and later via the Microsoft Store Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: A logic issue was addressed with improved restrictions. CVE-2020-9802: Samuel Groß of Google Project Zero WebKit Available for: Windows 10 and later via the Microsoft Store Impact: Processing maliciously crafted web content may lead to universal cross site scripting Description: A logic issue was addressed with improved restrictions. CVE-2020-9805: an anonymous researcher WebKit Available for: Windows 10 and later via the Microsoft Store Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: A type confusion issue was addressed with improved memory handling. CVE-2020-9800: Brendan Draper (@6r3nd4n) working with Trend Micro Zero Day Initiative WebKit Available for: Windows 10 and later via the Microsoft Store Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: A memory corruption issue was addressed with improved state management. CVE-2020-9806: Wen Xu of SSLab at Georgia Tech CVE-2020-9807: Wen Xu of SSLab at Georgia Tech WebKit Available for: Windows 10 and later via the Microsoft Store Impact: A remote attacker may be able to cause arbitrary code execution Description: A logic issue was addressed with improved restrictions. CVE-2020-9850: @jinmo123, @setuid0x0_, and @insu_yun_en of @SSLab_Gatech working with Trend Micro’s Zero Day Initiative WebKit Available for: Windows 10 and later via the Microsoft Store Impact: Processing maliciously crafted web content may lead to a cross site scripting attack Description: An input validation issue was addressed with improved input validation. CVE-2020-9843: Ryan Pickren (ryanpickren.com) WebKit Available for: Windows 10 and later via the Microsoft Store Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: A memory corruption issue was addressed with improved validation. CVE-2020-9803: Wen Xu of SSLab at Georgia Tech Additional recognition ImageIO We would like to acknowledge Lei Sun for their assistance. WebKit We would like to acknowledge Aidan Dunlap of UT Austin for their assistance. Installation note: iCloud for Windows 11.2 may be obtained from: https://support.apple.com/HT204283 -----BEGIN PGP SIGNATURE----- Version: BCPG v1.64 iQIcBAEDCAAGBQJezV70AAoJEAc+Lhnt8tDN2SAP/Ak5rb1JhLiHbsNKKIbKMzzD sMX4sO9c3GN7cJn+SAqcqMmD0+TmG132y2cVXTUdsg/1sabiIKj3NRxqcXCad1TK 8AZXFo1QBa+h1x5uQJO8JYyFu5v8Dk313MLaeOI7f/aMPW4ScxotubqzkEzv6ovj mKJzewqWcL7NJjRYKG+U4s36DgdO80iATRWWq0qfpRHLd70tQSVdnB3ncgzpRBiM q0Hs/JIoBzg1hYqzU/LlBJ4hKwbWkotqe+8WW8PO2k1Qpxwn2MQ8hvUlIAKcszwC LIw6wUYVenlaTjLZ05BD3MyI/Zg0UYKYdXvF5uzELQRrsYmdbrsOvlT2T6eIdOqF z7F8J9mPHcFb+Q695N4SPBcNsSn7Xf2r+iFcRfEO7uZMMYaSDKmi1bPiko5vmx/V OsEUToYAP8/h1ziWISc1JsRfN5R4q8ATiGpaDBMH0wAxs5S6TzyJLUAJP3rjrMm9 2isTit/bWZ9QE2bbnNC3bVXCKDvh4td536+4zvSRtN0dwWMlAeJ2odexaKSvuh46 /sm9ghzvVE7uWHRP1BEWzOVQxE2eZonSXCvElNzXxm/MyGxRGxb9HXLladknmzSM PXfpwoJGGzbr5/juPZ6C0w9UsXTBzDTATyszfjYKDf+h2nEXPsEq3i1jmSWjCKuG aov2VtgfuOGfTRWGUJrh =v2Wk -----END PGP SIGNATURE-----