Category Archives: Apple

Apple release iTunes 10.7 (32 Bit and 64 Bit Editions)

Apple iTunes 10.7 (32 Bit and 64 Bit Editions) provides the following enhancements and security fixes

• Adds support for iOS 6 running on compatible iPhone, iPad, and iPod touch models

• Adds support for the latest iPod nano and iPod shuffle models

• Impact: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution

• Description: Multiple memory corruption issues existed in WebKit. These issues are addressed through improved memory handling

• CVE-ID

• CVE-2011-3016 : miaubiz

• CVE-2011-3021 : Arthur Gerkis

• CVE-2011-3027 : miaubiz

• CVE-2011-3032 : Arthur Gerkis

• CVE-2011-3034 : Arthur Gerkis

• CVE-2011-3035 : wushi of team509 working with iDefense VCP, Arthur Gerkis

• CVE-2011-3036 : miaubiz

• CVE-2011-3037 : miaubiz

• CVE-2011-3038 : miaubiz

• CVE-2011-3039 : miaubiz

• CVE-2011-3040 : miaubiz

• CVE-2011-3041 : miaubiz

• CVE-2011-3042 : miaubiz

• CVE-2011-3043 : miaubiz

• CVE-2011-3044 : Arthur Gerkis

• CVE-2011-3050 : miaubiz

• CVE-2011-3053 : miaubiz

• CVE-2011-3059 : Arthur Gerkis

• CVE-2011-3060 : miaubiz

• CVE-2011-3064 : Atte Kettunen of OUSPG

• CVE-2011-3068 : miaubiz

• CVE-2011-3069 : miaubiz

• CVE-2011-3071 : pa_kt working with HP’s Zero Day Initiative

• CVE-2011-3073 : Arthur Gerkis

• CVE-2011-3074 : Slawomir Blazek

• CVE-2011-3075 : miaubiz

• CVE-2011-3076 : miaubiz

• CVE-2011-3078 : Martin Barbella of the Google Chrome Security Team

• CVE-2011-3081 : miaubiz

• CVE-2011-3086 : Arthur Gerkis

• CVE-2011-3089 : Skylined of the Google Chrome Security Team, miaubiz

• CVE-2011-3090 : Arthur Gerkis

• CVE-2011-3105 : miaubiz

• CVE-2011-3913 : Arthur Gerkis

• CVE-2011-3924 : Arthur Gerkis

• CVE-2011-3926 : Arthur Gerkis

• CVE-2011-3958 : miaubiz

• CVE-2011-3966 : Aki Helin of OUSPG

• CVE-2011-3968 : Arthur Gerkis

• CVE-2011-3969 : Arthur Gerkis

• CVE-2011-3971 : Arthur Gerkis

• CVE-2012-0682 : Apple Product Security

• CVE-2012-0683 : Dave Mandelin of Mozilla

• CVE-2012-1520 : Martin Barbella of the Google Chrome Security Team using AddressSanitizer, Jose A. Vazquez of spa-s3c.blogspot.com working with iDefense VCP

• CVE-2012-1521 : Skylined of the Google Chrome Security Team, Jose A. Vazquez of spa-s3c.blogspot.com working with iDefense VCP

• CVE-2012-2817 : miaubiz • CVE-2012-2818 : miaubiz

• CVE-2012-2829 : miaubiz

• CVE-2012-2831 : miaubiz

• CVE-2012-2842 : miaubiz

• CVE-2012-2843 : miaubiz

• CVE-2012-3589 : Dave Mandelin of Mozilla

• CVE-2012-3590 : Apple Product Security

• CVE-2012-3591 : Apple Product Security

• CVE-2012-3592 : Apple Product Security

• CVE-2012-3593 : Apple Product Security

• CVE-2012-3594 : miaubiz

• CVE-2012-3595 : Martin Barbella of Google Chrome Security

• CVE-2012-3596 : Skylined of the Google Chrome Security Team

• CVE-2012-3597 : Abhishek Arya of Google Chrome Security Team using AddressSanitizer

• CVE-2012-3598 : Apple Product Security

• CVE-2012-3599 : Abhishek Arya of Google Chrome Security Team using AddressSanitizer

• CVE-2012-3600 : David Levin of the Chromium development community

• CVE-2012-3601 : Martin Barbella of the Google Chrome Security Team using AddressSanitizer

• CVE-2012-3602 : miaubiz

• CVE-2012-3603 : Apple Product Security

• CVE-2012-3604 : Skylined of the Google Chrome Security Team

• CVE-2012-3605 : Cris Neckar of the Google Chrome Security team

• CVE-2012-3606 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer

• CVE-2012-3607 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer

• CVE-2012-3608 : Skylined of the Google Chrome Security Team

• CVE-2012-3609 : Skylined of the Google Chrome Security Team

• CVE-2012-3610 : Skylined of the Google Chrome Security Team

• CVE-2012-3611 : Apple Product Security

• CVE-2012-3612 : Skylined of the Google Chrome Security Team

• CVE-2012-3613 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer

• CVE-2012-3614 : Yong Li of Research In Motion, Inc.

• CVE-2012-3615 : Stephen Chenney of the Chromium development community

• CVE-2012-3616 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer

• CVE-2012-3617 : Apple Product Security

• CVE-2012-3618 : Abhishek Arya of Google Chrome Security Team using AddressSanitizer

• CVE-2012-3620 : Abhishek Arya of Google Chrome Security Team

• CVE-2012-3621 : Skylined of the Google Chrome Security Team

• CVE-2012-3622 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer

• CVE-2012-3623 : Skylined of the Google Chrome Security Team

• CVE-2012-3624 : Skylined of the Google Chrome Security Team

• CVE-2012-3625 : Skylined of Google Chrome Security Team

• CVE-2012-3626 : Apple Product Security

• CVE-2012-3627 : Skylined and Abhishek Arya of Google Chrome Security team

• CVE-2012-3628 : Apple Product Security

• CVE-2012-3629 : Abhishek Arya of Google Chrome Security Team using AddressSanitizer

• CVE-2012-3630 : Abhishek Arya of Google Chrome Security Team using AddressSanitizer

• CVE-2012-3631 : Abhishek Arya of Google Chrome Security Team using AddressSanitizer

• CVE-2012-3632 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer

• CVE-2012-3633 : Martin Barbella of Google Chrome Security Team using AddressSanitizer

• CVE-2012-3634 : Martin Barbella of Google Chrome Security Team using AddressSanitizer

• CVE-2012-3635 : Martin Barbella of Google Chrome Security Team using AddressSanitizer

• CVE-2012-3636 : Martin Barbella of Google Chrome Security Team using AddressSanitizer

• CVE-2012-3637 : Martin Barbella of Google Chrome Security Team using AddressSanitizer

• CVE-2012-3638 : Martin Barbella of Google Chrome Security Team using AddressSanitizer

• CVE-2012-3639 : Martin Barbella of Google Chrome Security Team using AddressSanitizer

• CVE-2012-3640 : miaubiz

• CVE-2012-3641 : Slawomir Blazek

• CVE-2012-3642 : miaubiz

• CVE-2012-3643 : Skylined of the Google Chrome Security Team

• CVE-2012-3644 : miaubiz

• CVE-2012-3645 : Martin Barbella of Google Chrome Security Team using AddressSanitizer

• CVE-2012-3646 : Julien Chaffraix of the Chromium development community, Martin Barbella of Google Chrome Security Team using AddressSanitizer

• CVE-2012-3647 : Skylined of the Google Chrome Security Team

• CVE-2012-3648 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer

• CVE-2012-3649 : Dominic Cooney of Google and Martin Barbella of the Google Chrome Security Team

• CVE-2012-3651 : Abhishek Arya and Martin Barbella of the Google Chrome Security Team

• CVE-2012-3652 : Martin Barbella of Google Chrome Security Team

• CVE-2012-3653 : Martin Barbella of Google Chrome Security Team using AddressSanitizer

• CVE-2012-3654 : Skylined of the Google Chrome Security Team

• CVE-2012-3655 : Skylined of the Google Chrome Security Team

• CVE-2012-3656 : Abhishek Arya of Google Chrome Security Team using AddressSanitizer

• CVE-2012-3657 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer

• CVE-2012-3658 : Apple

• CVE-2012-3659 : Mario Gomes of netfuzzer.blogspot.com, Abhishek Arya of the Google Chrome Security Team using AddressSanitizer

• CVE-2012-3660 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer

• CVE-2012-3661 : Apple Product Security

• CVE-2012-3663 : Skylined of Google Chrome Security Team

• CVE-2012-3664 : Thomas Sepez of the Chromium development community

• CVE-2012-3665 : Martin Barbella of Google Chrome Security Team using AddressSanitizer

• CVE-2012-3666 : Apple

• CVE-2012-3667 : Trevor Squires of propaneapp.com

• CVE-2012-3668 : Apple Product Security

• CVE-2012-3669 : Apple Product Security

• CVE-2012-3670 : Abhishek Arya of Google Chrome Security Team using AddressSanitizer, Arthur Gerkis

• CVE-2012-3671 : Skylined and Martin Barbella of the Google Chrome Security Team

• CVE-2012-3672 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer

• CVE-2012-3673 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer

• CVE-2012-3674 : Skylined of Google Chrome Security Team

• CVE-2012-3675 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer

• CVE-2012-3676 : Julien Chaffraix of the Chromium development community

• CVE-2012-3677 : Apple

• CVE-2012-3678 : Apple Product Security

• CVE-2012-3679 : Chris Leary of Mozilla

• CVE-2012-3680 : Skylined of Google Chrome Security Team

• CVE-2012-3681 : Apple

• CVE-2012-3682 : Adam Barth of the Google Chrome Security Team

• CVE-2012-3683 : wushi of team509 working with iDefense VCP

• CVE-2012-3684 : kuzzcc

• CVE-2012-3685 : Apple Product Security

• CVE-2012-3686 : Robin Cao of Torch Mobile (Beijing)

• CVE-2012-3687 : kuzzcc

• CVE-2012-3688 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer

• CVE-2012-3692 : Skylined of the Google Chrome Security Team, Apple Product Security

• CVE-2012-3699 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer

• CVE-2012-3700 : Apple Product Security

• CVE-2012-3701 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer

• CVE-2012-3702 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer

• CVE-2012-3703 : Apple Product Security

• CVE-2012-3704 : Skylined of the Google Chrome Security Team

• CVE-2012-3705 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer

• CVE-2012-3706 : Apple Product Security

• CVE-2012-3707 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer

• CVE-2012-3708 : Apple

• CVE-2012-3709 : Apple Product Security

• CVE-2012-3710 : James Robinson of Google

• CVE-2012-3711 : Skylined of the Google Chrome Security Team

• CVE-2012-3712 : Abhishek Arya of the Google Chrome Security Team using AddressSanitizer

You can download Apple iTunes 10.7 by visiting the following link http://www.apple.com/itunes/

VideoLAN VLC Media Player Version 2.0.1 Released for Windows and Mac OS X

VideoLAN VLC Media Player Version 2.0.1 has been released and includes the following fixes and new features:

• Support for MxPEG files and streams

• New features in the Mac OS X interface for more customization

• Numerous fixes in the Qt, the Mac OS and the skins interfaces

• Fixes for HTTP Live Streaming, CDDB, UDP/RTP support

• Security issues SA-1201 and SA-1202

• Limited support for Bluray discs menus

• Numerous fixes for MKV support

• Fix for splitted RAR files playback

• Numerous fixes for more than 120 bugs

• Codec and 3rd party libraries security updates

VLC Media Player can be download from http://www.videolan.org/vlc/#download

VideoLAN VLC Media Player Version 2.0.0 Released for Windows and Mac OS X

VideoLAN VLC Media Player Version 2.0.0 has been released and includes the following fixes and new features:

Video
  • Rewritten video output core and modules, allowing subpicture blending in GPU
  • Shader support in the OpenGL output, for colorspace conversion, including 10bits
  • New video outputs for Windows 7, Android, iOS and OS/2
  • New debanding, grain, denoising and anti-flickering filters
  • New deinterlacing filter, including an Inverse Telecine algorithm
Audio
  • New resamplers for higher quality audio
  • New dynamic range compressor and karaoke filters
  • Simplification of the audio core for faster processing
  • New audio outputs for iOS, Android and OS/2
Formats
  • Multi-threaded decoding for H.264, MPEG-4/Xvid and WebM
  • Support for 10bits codecs, WMV image and some other codecs
  • Rewritten support for images, including jpeg, png, xcf, bmp
  • Important changes in RealVideo and Real Format support
  • CrystalHD cards and Android OpenMAX support for hardware decoding
Input and Devices
  • Experimental support for BluRay discs: [Menus are deactivated in this release (will come soon)] [AACS and BD+ DRM libraries and keys are not shipped, for legal reasons]
  • Support for SDI capture cards and QTKit devices
  • Support for new adaptive streaming protocols, like HLS and DASH
For Mac Users
  • Completely new, single window interface: [Available in 2 colors: Lion grey and QTX black] [Extensions support and better Lion integration]
  • Support for all QTKit devices through qtcapture and qtsound modules
  • Continued support for X 10.5 and PPC users (1080p and ProRes on Dual-G5!)
For Anime Fans
  • Vastly improved MKV demuxer
  • Rewritten linked segments and ordered chapter files support
  • Correct support for FLAC, RV and Hi10p in MKV
  • Rewritten seeking support in cue files
  • Various ASS subtitles improvements
For professional Users
  • Support for ProRes 422 and 4444, AVC/Intra
  • Support for Jpeg-2000, Dirac and DNxHD/VC-3 in 10bits
  • Support for EBU subtitles (stl) and EIA-608
  • SDI and HD-SDI card support for input on Linux
  • New Dirac/VC-2 encoder, faster than the previous one
For Developers
  • libVLC, libVLCcore and libcompat have switched from GPL to LGPLv2.1+
  • New libVLC examples are available: media player, photobooth and mediainfo clones
  • New JSON requests on the web interface to control running VLC instances
  • Implementation of the MPRIS2 interface to control media players
  • VLC’s web plugins have been rewritten for better integration and stability in all browsers

VLC Media Player can be download from http://www.videolan.org/vlc/#download

Apple release iTunes 10.6.3 (32 Bit and 64 Bit Editions)

Apple iTunes 10.6.3 (32 Bit and 64 Bit) has recently been released and includes the following new features and fixes:

  • Addresses a problem where iTunes may become unresponsive when syncing an iPad (1st generation) that contains an iBooks textbook
  • Fixes a problem where photos synced to a device may appear in an unexpected order
  • Resolves an issue where iTunes may unexpectedly delete playlists created on a device
  • Fixes issues where iTunes may unexpectedly delete apps on a device
  • Improves overall performance and reliability

You can download the 32 Bit or the 64 Bit version from the Apple Website:

iTunes 10.6.3 for Windows (32 bit Edition) – http://support.apple.com/kb/DL1426

iTunes 10.6.3 for Windows (64 bit Edition) – http://support.apple.com/kb/DL1427