GarageBand update brings important security fix

Apple on Tuesday released an update to GarageBand, its software for digital audio workstations. However, while the update doesn't add any new features, it does bring an important security fix for GarageBand users on macOS. Read on as we detail what fixes are included in today's updates.

A security patch has been added to GarageBand for macOS

According to an article on Apple's support website, GarageBand 10.4.11 for macOS fixes a security vulnerability that could lead to “unexpected application termination or arbitrary code execution”; when processing a malicious file. Apple says that “the use-after-free issue has been resolved with improved memory management.”

For those unfamiliar, GarageBand is Apple's powerful free audio editor and creative software. The app has virtual instruments, a huge library of sounds, support for multiple tracks, guitar and piano lessons, and much more. The app is available for both iOS and macOS.

GarageBand is a fully equipped music production studio right inside your Mac – with a full sound library including instruments . , guitar and voice presets, and an incredible selection of session drummers and percussionists. With an intuitive, modern design, you can easily learn, play, record, create, and share your hits around the world.

The latest version of GarageBand for macOS is available on the Mac App Store. . The iPhone and iPad version can also be downloaded for free from the App Store. It's worth noting that the discovered security exploit only affected the macOS version of GarageBand, so there are no updates available for the iOS version.

With the release of macOS 14.4 last week, Apple claims to have patched dozens of security vulnerabilities. More information about the exploits patched by Apple can be found here.

Read also

  • Here's how to protect yourself from GoldPickaxe, the first iPhone Trojan.
  • iOS 17.4 includes 4 important security patches, 2 of which have been exploited

Leave a Reply

Your email address will not be published. Required fields are marked *