APPLE

macOS Ventura 13.4.1 software update has been released

98
×

macOS Ventura 13.4.1 software update has been released

Share this article

Apple recently released iOS 16.5.1 for iPhone and iPadOS 16.5.1 for iPad, and also released a new Mac software update in the form of macOS Ventura 13.4.1. This update mainly includes security fixes for the Mac OS, and it doesn’t bring any new features to the Mac.

The new macOS Ventura 13.4.1 software update fixes security flaws in Apple’s macOS software, and Apple has released a few other updates for older Macs that fix the same security issues. Apple has listed the bugs that have been fixed, and they are listed below.

macOS Ventura 13.4.1

Released June 21, 2023

nucleus

Available for: macOS Ventura

Impact: An application may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue has been actively exploited against iOS versions released prior to iOS 15.7.

Description: An integer overflow was addressed with improved input validation.

CVE-2023-32434: Georgy Kucherin (@kucher1n), Leonid Bezvershenko (@bzvr_) and Boris Larin (@oct0xor) from Kaspersky

WebKit

Available for: macOS Ventura

Impact: Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue has been actively exploited.

Description: A type confusion issue was addressed with improved validations.

WebKit Bugzilla: 256567
CVE-2023-32439: An anonymous researcher

It is recommended that you install the new macOS software update on your Mac as soon as possible to correct these two macOS errors, and you can find out more details at Apple at the link below.

Apple source

Image credit: n

Filed under: Apple

See also  iOS 16.6 Public Beta 4

Latest TechMehow

 

disclosure: Some of our articles include affiliate links. If you buy something through one of these links, TechMehow may earn an affiliate commission. Learn about our disclosure policy.

Leave a Reply

Your email address will not be published. Required fields are marked *