- OS X MOUNTAIN LION UPDATE V10.8. MAC OS X
- OS X MOUNTAIN LION UPDATE V10.8. PATCH
- OS X MOUNTAIN LION UPDATE V10.8. FULL
- OS X MOUNTAIN LION UPDATE V10.8. PRO
(Click here for instructions on installing software that is not code-signed.) Software that is not code-signed may cause Apple Gatekeeper to display a dialog warning the user that the application is not code-signed. Sibelius - ML support added in v7.1.3 ( more info)
OS X MOUNTAIN LION UPDATE V10.8. PRO
Pro Tools - ML support added in v10.3.4 ( more info) Media Composer - ML supported added in v6.5 ( more info) For compatibility info please see the the following:
OS X MOUNTAIN LION UPDATE V10.8. MAC OS X
Mac OS X 10.8 Compatibility Information for Avid Software ProductsĪvid has updated our software to provide Mountain Lion support, including code-signed software and installers. Products Affected : Media Composer, Pro Tools
OS X Lion: GNU bash, version 3.2.Avid Software and Mac OS X 10.8 (Mountain Lion) OS X Mountain Lion: GNU bash, version 3.2.53(1)-release (x86_64-apple-darwin12) OS X Mavericks: GNU bash, version 3.2.53(1)-release (x86_64-apple-darwin13) * The version after applying this update will be: OS X bash Update 1.0 may be obtained from the following webpages: Prefix "_BASH_FUNC()" to prevent unintended function passing via The names of allĮnvironment variables that introduce function definitions are required to have a In addition, this update added a new namespace for exported functions by creating aįunction decorator to prevent unintended header passthrough to Bash. This update also incorporated the suggested CVE-2014-7169 change, which resets the This issue wasĪddressed through improved environment variable parsing by better detecting the end of Impact: In certain configurations, a remote attacker may be able to execute arbitraryĭescription: An issue existed in Bash's parsing of environment variables.
OS X bash Update 1.0 is now available and addresses the following:Īvailable for: OS X Lion v10.7.5, OS X Lion Server v10.7.5, OS X Mountain Lion v10.8.5, Here's the description from Apple's security-announce mailing list (I haven't seen it on HT1222 yet):
OS X MOUNTAIN LION UPDATE V10.8. PATCH
The OS X update wasn't yet available from Software Update on our Mavericks system when we checked, but in the meantime you can grab the Mavericks, Mountain Lion, and Lion versions of the patch manually from Apple's software downloads site.
OS X MOUNTAIN LION UPDATE V10.8. FULL
In the case of Web servers, it can allow attackers to gain full control of the system. Exploits of the bug have already been spotted in the wild, and end users and server administrators are all encouraged to patch their systems as soon as possible. Shellshock, in essence, allows attackers to issue commands to systems via malformed environment variables. The company previously stated that Macs "are safe by default and not exposed to remote exploits of bash unless users configure advanced UNIX services." Non-jailbroken iOS devices shouldn't be vulnerable to the exploit at all. An Apple representative told Ars that the company would not be releasing an individual patch for users running the current OS X Yosemite developer or public beta builds, but the rep went on to say the bug will be fixed in future builds of the software. The update requires the OS X 10.9.5, 10.8.5, or 10.7.5 updates to be installed on your system first. When installed on an OS X Mavericks system, the patch upgraded the Bash shell from version 3.2.51 to version 3.2.53, something that users could already do manually if they were so inclined. Bash, which is the default shell for many Unix and Linux-based operating systems, has been updated two times to fix the Shellshock remote exploit bug, and many Linux distributions have already issued updates to their users. Further Reading Bug in Bash shell creates big security hole on anything with *nix in it Apple has just released the OS X Bash Update 1.0 for OS X Mavericks, Mountain Lion, and Lion, a patch that fixes the "Shellshock" bug in the Bash shell that we first reported on last week.