corporatetechentertainmentresearchmiscwellnessathletics

APPLE-SA-12-11-2024-5 macOS Ventura 13.7.2


APPLE-SA-12-11-2024-5 macOS Ventura 13.7.2

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 APPLE-SA-12-11-2024-5 macOS Ventura 13.7.2 macOS Ventura 13.7.2 addresses the following issues. Information about the security content is also available at https://support.apple.com/121842. Apple maintains a Security Releases page at https://support.apple.com/100100 which lists recent software updates with security advisories. Apple Software Restore Available for: macOS Ventura Impact: An app may be able to access user-sensitive data Description: The issue was addressed with improved checks. CVE-2024-54477: Mickey Jin (@patch1t), Csaba Fitzl (@theevilbit) of Kandji AppleMobileFileIntegrity Available for: macOS Ventura Impact: An app may be able to access sensitive user data Description: This issue was addressed with improved checks. CVE-2024-54527: Mickey Jin (@patch1t) AppleMobileFileIntegrity Available for: macOS Ventura Impact: A malicious app may be able to access private information Description: The issue was addressed with improved checks. CVE-2024-54526: Mickey Jin (@patch1t), Arsenii Kostromin (0x3c3e) Audio Available for: macOS Ventura Impact: An app may be able to execute arbitrary code with kernel privileges Description: A logic issue was addressed with improved checks. CVE-2024-54529: Dillon Franke working with Google Project Zero Crash Reporter Available for: macOS Ventura Impact: An app may be able to access protected user data Description: A logic issue was addressed with improved file handling. CVE-2024-44300: an anonymous researcher DiskArbitration Available for: macOS Ventura Impact: An encrypted volume may be accessed by a different user without prompting for the password Description: An authorization issue was addressed with improved state management. CVE-2024-54466: Michael Cohen Disk Utility Available for: macOS Ventura Impact: Running a mount command may unexpectedly execute arbitrary code Description: A path handling issue was addressed with improved validation. CVE-2024-54489: D'Angelo Gonzalez of CrowdStrike FontParser Available for: macOS Ventura Impact: Processing a maliciously crafted font may result in the disclosure of process memory Description: The issue was addressed with improved checks. CVE-2024-54486: Hossein Lotfi (@hosselot) of Trend Micro Zero Day Initiative ImageIO Available for: macOS Ventura Impact: Processing a maliciously crafted image may result in disclosure of process memory Description: The issue was addressed with improved checks. CVE-2024-54500: Junsung Lee working with Trend Micro Zero Day Initiative Kernel Available for: macOS Ventura Impact: An attacker may be able to create a read-only memory mapping that can be written to Description: A race condition was addressed with additional validation. CVE-2024-54494: sohybbyk Kernel Available for: macOS Ventura Impact: An app may be able to leak sensitive kernel state Description: A race condition was addressed with improved locking. CVE-2024-54510: Joseph Ravichandran (@0xjprx) of MIT CSAIL libarchive Available for: macOS Ventura Impact: Processing a malicious crafted file may lead to a denial-of- service Description: The issue was addressed with improved memory handling. CVE-2024-44201: Ben Roeder libexpat Available for: macOS Ventura Impact: A remote attacker may cause an unexpected app termination or arbitrary code execution Description: This is a vulnerability in open source code and Apple Software is among the affected projects. The CVE-ID was assigned by a third party. Learn more about the issue and CVE-ID at cve.org. CVE-2024-45490 libxpc Available for: macOS Ventura Impact: An app may be able to break out of its sandbox Description: The issue was addressed with improved checks. CVE-2024-54514: an anonymous researcher libxpc Available for: macOS Ventura Impact: An app may be able to gain elevated privileges Description: A logic issue was addressed with improved checks. CVE-2024-44225: 风沐云烟(@binary_fmyy) PackageKit Available for: macOS Ventura Impact: An app may be able to access user-sensitive data Description: The issue was addressed with improved checks. CVE-2024-54474: Mickey Jin (@patch1t) CVE-2024-54476: Mickey Jin (@patch1t), Bohdan Stasiuk (@Bohdan_Stasiuk) SceneKit Available for: macOS Ventura Impact: Processing a maliciously crafted file may lead to a denial of service Description: The issue was addressed with improved checks. CVE-2024-54501: Michael DePlante (@izobashi) of Trend Micro's Zero Day Initiative Screen Sharing Server Available for: macOS Ventura Impact: A user with screen sharing access may be able to view another user's screen Description: This issue was addressed through improved state management. CVE-2024-44248: Halle Winkler, Politepix (theoffcuts.org) SharedFileList Available for: macOS Ventura Impact: An app may be able to overwrite arbitrary files Description: A logic issue was addressed with improved restrictions. CVE-2024-54528: an anonymous researcher SharedFileList Available for: macOS Ventura Impact: An app may be able to break out of its sandbox Description: A path handling issue was addressed with improved validation. CVE-2024-54498: an anonymous researcher Software Update Available for: macOS Ventura Impact: A malicious app may be able to gain root privileges Description: A logic issue was addressed with improved file handling. CVE-2024-44291: Arsenii Kostromin (0x3c3e) StorageKit Available for: macOS Ventura Impact: A malicious app may be able to gain root privileges Description: A permissions issue was addressed with additional restrictions. CVE-2024-44224: Amy (@asentientbot) Additional recognition CUPS We would like to acknowledge evilsocket for their assistance. Proximity We would like to acknowledge Junming C. (@Chapoly1305) and Prof. Qiang Zeng of George Mason University for their assistance. Sandbox We would like to acknowledge IES Red Team of ByteDance for their assistance. macOS Ventura 13.7.2 may be obtained from the Mac App Store or Apple's Software Downloads web site: https://support.apple.com/downloads/ All information is also posted on the Apple Security Releases web site: https://support.apple.com/100100. This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEsz9altA7uTI+rE/qX+5d1TXaIvoFAmdaAr0ACgkQX+5d1TXa IvrFmBAAgx0PAlTIwnyuyJgPxCKWjT/qprdsYnTFslbgdk+8nih+casm2SuMHikg XKCNwN8MamivmwmC1grnFcpffDcl6wbzFwtqsIKcqKNv2manIyHapbaG8haQv+sW aozi6xx+vuNUR9E+ySpF3wmavYbClwbAXL0KalEngsfRfGaIjdNtCDds+KYMz2vd xtps0yJog+a4k4SlPpulRZbtBEch83ONF+llf1z9fBO+Yl8E7zhEMDPXnFuuMt1e GBFk7hZwdMvTMhTOPBAIVmcPT5x2IHg9S2OokUL6WlSO9XbscZzbK+y5eLVzjQnh 9T2hTTWwvHgXsPuiV5bVhxmbE/EvlOU6K33m1o4rm8VGd28Xfrc042PbocWaeeYd /KXc6Gtpw5j3JdxTF1iFjcrK0/weqrOg2XT+Uir61nPm7gYAQQMxxUe9RHqfoxrN m5A7/bbpWO7SW3njMmwY2AjbJrCY0wDqS2kKaAUsUI/4eW4HajrVH2skrlCviEbm aKnWgastug8AvrqSyITRoQ3s6UX2V95cg+NsYPSJP2Nu8DqOE+zQ7mAL9KoA8s8K H9ONBDLHbrh6pREP2lqEOUVfXqC8OvWmtrtwjJDGoljQHvoKQ48AxCbnbtQL3Oeu kP4j7t4Faxb0dADLMecYd1HE5555w7Wpn+IE32G3hmbPU3hS4X8= =8UQ3 -----END PGP SIGNATURE----- _______________________________________________ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: https://seclists.org/fulldisclosure/

Previous articleNext article

POPULAR CATEGORY

corporate

10284

tech

11464

entertainment

12649

research

5723

misc

13400

wellness

10195

athletics

13373