lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Mon, 10 Jul 2023 15:50:39 -0700
From: Apple Product Security via Fulldisclosure <fulldisclosure@...lists.org>
To: security-announce@...ts.apple.com
Subject: [FD] APPLE-SA-2023-07-10-3 Rapid Security Responses for macOS
	Ventura 13.4.1

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

APPLE-SA-2023-07-10-3 Rapid Security Responses for macOS Ventura 13.4.1

Rapid Security Responses for macOS Ventura 13.4.1 addresses the following issues.
Information about the security content is also available at
https://support.apple.com/kb/HT213825.

Apple maintains a Security Updates page at
https://support.apple.com/HT201222 which lists recent
software updates with security advisories.

This document describes the content of Rapid Security Responses.

About Rapid Security Responses
Rapid Security Responses deliver important security improvements between
software updates and are available only for the latest versions of iOS,
iPadOS, and macOS. Learn more about Rapid Security Responses.
Recent releases are listed on the Apple security releases page.

macOS Ventura 13.4.1 (a)

WebKit
Available for: macOS Ventura 13.4.1
Impact: Processing web content may lead to arbitrary code execution.
Apple is aware of a report that this issue may have been actively
exploited.
Description: The issue was addressed with improved checks.
CVE-2023-37450: an anonymous researcher


All information is also posted on the Apple Security Updates
web site: https://support.apple.com/en-us/HT201222.

This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----
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=LWxX
-----END PGP SIGNATURE-----

_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: https://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ