[<prev] [next>] [day] [month] [year] [list]
Message-id: <5AB17F84-4A23-46DF-9672-9B275F1BA799@lists.apple.com>
Date: Mon, 10 Jul 2023 15:50:39 -0700
From: Apple Product Security via Fulldisclosure <fulldisclosure@...lists.org>
To: security-announce@...ts.apple.com
Subject: [FD] APPLE-SA-2023-07-10-3 Rapid Security Responses for macOS
Ventura 13.4.1
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
APPLE-SA-2023-07-10-3 Rapid Security Responses for macOS Ventura 13.4.1
Rapid Security Responses for macOS Ventura 13.4.1 addresses the following issues.
Information about the security content is also available at
https://support.apple.com/kb/HT213825.
Apple maintains a Security Updates page at
https://support.apple.com/HT201222 which lists recent
software updates with security advisories.
This document describes the content of Rapid Security Responses.
About Rapid Security Responses
Rapid Security Responses deliver important security improvements between
software updates and are available only for the latest versions of iOS,
iPadOS, and macOS. Learn more about Rapid Security Responses.
Recent releases are listed on the Apple security releases page.
macOS Ventura 13.4.1 (a)
WebKit
Available for: macOS Ventura 13.4.1
Impact: Processing web content may lead to arbitrary code execution.
Apple is aware of a report that this issue may have been actively
exploited.
Description: The issue was addressed with improved checks.
CVE-2023-37450: an anonymous researcher
All information is also posted on the Apple Security Updates
web site: https://support.apple.com/en-us/HT201222.
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCAAdFiEEBP+4DupqR5Sgt1DB4RjMIDkeNxkFAmSsimcACgkQ4RjMIDke
Nxmftg/+PMGeD/jEu66Z6M8ygN4zGzkuxFMUN1VzPDa7qsxjXI5uIaZSTmDKJYAm
HO7Vj7NPJ70Uy3Xeu+I++F8JyClXaMrHLM0fuQ/Kgm3XHet1kjRX+z0hpFZ2KxN+
eGSAEJ6cn+Bf0MS/BeEYaoerBCmduuA0gIxBrHgMA3eHD2v84G34OWyY2/wSe0PF
nW38sAvyVXbfL+vHpO8fpQkhGxPU+qa5c8ov6xWEHmqlPbxdHih1UZjjI4f3TZrq
/M7DIRXd1pXw0ZasIRjBdrCsp+mO2oM5vUGOdwazC645PcpO//UTnfCFBsiZbhYg
RQ5iGkw1wqkfXmH2GDZSTQ3hq3KWky/+BpqZWMw9vAJ/ZOYOEQobsUi5tZflkTo2
MM2ugbVmiCluf8eMYp6YpY8mpnUG7hiHPbKZ8YZoWb61IC+jbW5vobxLCv4q+ZZO
lLiuzogtEjqAfJBg5WsMeZKyuXw0wlEdsRjQQym8UfYULbgv8ZsrpWhOv6g79LYa
EOl0lkxMflAO1jytSJv+D3Crhc3a4VXmo8km+0PfU3BVLDMRkG7h7cNuXBrtNelL
JwrJLzovdtkonZecftwxEK8fWfaeuBEcUYwrLYPKJuvBej5lDdo8BdTGinO+99PV
aZ2uop/kKLxSECg0j536LnI4eE2fjlpRP1SF+2KiAUJUh97CqnQ=
=LWxX
-----END PGP SIGNATURE-----
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: https://seclists.org/fulldisclosure/
Powered by blists - more mailing lists