lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-id: <701F3DFF-A749-48E0-B2A7-E7FA348150B0@lists.apple.com> Date: Tue, 12 Mar 2024 16:44:11 -0700 From: Apple Product Security via Fulldisclosure <fulldisclosure@...lists.org> To: Apple Product Security via Security-announce <security-announce@...ts.apple.com> Subject: [FD] APPLE-SA-03-12-2024-1 GarageBand 10.4.11 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 APPLE-SA-03-12-2024-1 GarageBand 10.4.11 GarageBand 10.4.11 addresses the following issues. Information about the security content is also available at https://support.apple.com/HT214090. Apple maintains a Security Updates page at https://support.apple.com/HT201222 which lists recent software updates with security advisories. GarageBand Available for: macOS Ventura and macOS Sonoma Impact: Processing a maliciously crafted file may lead to unexpected app termination or arbitrary code execution Description: A use-after-free issue was addressed with improved memory management. CVE-2024-23300: Marc Schoenefeld, Dr. rer. nat. GarageBand 10.4.11 may be obtained from the App Store. All information is also posted on the Apple Security Updates web site: https://support.apple.com/HT201222. This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEsz9altA7uTI+rE/qX+5d1TXaIvoFAmXw5dYACgkQX+5d1TXa IvpFLw/9ExaKuCx71r7iHpq/1M5z8aHNZNl3mZPP/NoVQIs8/ERz/n0fBRRljSZg 8LnRH2lsRBKZtxN9CVEu5H5W8xAHa6DMdvMozjvwRbWFh0xDlLtgXbpuv9GGTGcB tmu9uQxpebG+s5MTfng2gZ1bSQ8G8dvEicHmLOsjIps8cI89uOiciXnFKb7GEOgD CO6quhznWETyzRZwAQtGQiD9jI7xgrlZLIGYb/dKg+WAvJrPvXvhZPLNdWCTwikp RD7xf2lzfu8S+o00FrjFQ1r5Xdt/GW8VUiT+r8cb65+v9HESzJUs2hoCXxQtzKYD SSAzbbAG9/n4Ku92jGItiGRk0M/wjJSvwWoBlUh3LTjA3XM75+vohl2PCGOoan+r TDTDf9PbAnSP4ysWM8/uXphebzLDww2c0pDaHRx6ZhAwi3BsHForVXJyD3DVWC92 kw9PoYR3vcaJzAvDlWmrNTzrRRIU7SDT053fwst92zltirXjJB8lGYmtZTxWTbfS r6zCafVaxDhnuiDOdfnLSo0h5KBI1NXqG4H2mwI4f0ddP3Xn+m3XnF/apX3CXLZz 58ulakxmg8Xsil0oV/1k46aQnEXjy2bwyt8CdUxOgcamd/haakOh0xsAnKltNbPi LUtwvFj6mbYV8u7PHgQSvK4O8Mmdm5BS48TNXZT6WR8Xz06DHp0= =JCnR -----END PGP SIGNATURE----- _______________________________________________ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: https://seclists.org/fulldisclosure/
Powered by blists - more mailing lists