Update

An app may be able to access user-sensitive data & other Fixes

macOS Sonoma 14.7
Released September 16, 2024

Security Updates

Accounts

  • Available for: macOS Sonoma
  • Impact: An app may be able to access user-sensitive data
  • Description: The issue was addressed with improved permissions logic.
  • CVE-2024-44153: Mickey Jin (@patch1t)

App Intents

  • Available for: macOS Sonoma
  • Impact: An app may be able to access sensitive data logged when a shortcut fails to launch another app
  • Description: This issue was addressed with improved redaction of sensitive information.
  • CVE-2024-44182: Kirin (@Pwnrin)

AppleGraphicsControl

  • Available for: macOS Sonoma
  • mpact: Processing a maliciously crafted video file may lead to unexpected app termination
  • Description: The issue was addressed with improved memory handling.
  • CVE-2024-40846: Michael DePlante (@izobashi) of Trend Micro Zero Day Initiative
  • CVE-2024-40845: Pwn2car working with Trend Micro Zero Day Initiative

AppleGraphicsControl

  • Available for: macOS Sonoma
  • Impact: Processing a maliciously crafted file may lead to unexpected app termination
  • Description: A memory initialization issue was addressed with improved memory handling.
  • CVE-2024-44154: Michael DePlante (@izobashi) of Trend Micro Zero Day Initiative

AppleMobileFileIntegrity

  • Available for: macOS Sonoma
  • Impact: An app may be able to access sensitive user data
  • Description: The issue was addressed with additional code-signing restrictions.
  • CVE-2024-40847: Mickey Jin (@patch1t)

AppleMobileFileIntegrity

  • Available for: macOS Sonoma
  • Impact: An app may be able to bypass Privacy preferences
  • Description: This issue was addressed with improved checks.
  • CVE-2024-44164: Mickey Jin (@patch1t)

AppleMobileFileIntegrity

  • Available for: macOS Sonoma
  • Impact: An app may be able to modify protected parts of the file system
  • Description: A library injection issue was addressed with additional restrictions.
  • CVE-2024-44168: Claudio Bozzato and Francesco Benvenuto of Cisco Talos

AppleMobileFileIntegrity

  • Available for: macOS Sonoma
  • Impact: An attacker may be able to read sensitive information
  • Description: A downgrade issue was addressed with additional code-signing restrictions.
  • CVE-2024-40848: Mickey Jin (@patch1t)

AppleVA

  • Available for: macOS Sonoma
  • Impact: Processing a maliciously crafted video file may lead to unexpected app termination
  • Description: An out-of-bounds write issue was addressed with improved bounds checking.
  • CVE-2024-40841: Michael DePlante (@izobashi) of Trend Micro Zero Day Initiative

AppSandbox

  • Available for: macOS Sonoma
  • Impact: An app may be able to access protected files within an App Sandbox container
  • Description: A permissions issue was addressed with additional restrictions.
  • CVE-2024-44135: Mickey Jin (@patch1t)

Automator

  • Available for: macOS Sonoma
  • Impact: An Automator Quick Action workflow may be able to bypass Gatekeeper
  • Description: This issue was addressed by adding an additional prompt for user consent.
  • CVE-2024-44128: Anton Boegler

bless

  • Available for: macOS Sonoma
  • Impact: An app may be able to modify protected parts of the file system
  • Description: A permissions issue was addressed with additional restrictions.
  • CVE-2024-44151: Mickey Jin (@patch1t)

Compression

  • Available for: macOS Sonoma
  • Impact: Unpacking a maliciously crafted archive may allow an attacker to write arbitrary files
  • Description: A race condition was addressed with improved locking.
  • CVE-2024-27876: Snoolie Keffaber (@0xilis)

Dock

  • Available for: macOS Sonoma
  • Impact: An app may be able to access user-sensitive data
  • Description: A privacy issue was addressed by removing sensitive data.
  • CVE-2024-44177: an anonymous researcher

Game Center
Available for: macOS Sonoma
Impact: An app may be able to access user-sensitive data
Description: A file access issue was addressed with improved input validation.

CVE-2024-40850: Denis Tokarev (@illusionofcha0s)

ImageIO

  • Available for: macOS Sonoma
  • Impact: Processing a maliciously crafted file may lead to unexpected app termination
  • Description: An out-of-bounds read issue was addressed with improved input validation.
  • CVE-2024-27880: Junsung Lee

ImageIO

  • Available for: macOS Sonoma
  • Impact: Processing an image may lead to a denial-of-service
  • Description: An out-of-bounds access issue was addressed with improved bounds checking.
  • CVE-2024-44176: dw0r of ZeroPointer Lab working with Trend Micro Zero Day Initiative, an anonymous researcher

Intel Graphics Driver

  • Available for: macOS Sonoma
  • Impact: Processing a maliciously crafted texture may lead to unexpected app termination
  • Description: A buffer overflow issue was addressed with improved memory handling.
  • CVE-2024-44160: Michael DePlante (@izobashi) of Trend Micro Zero Day Initiative

Intel Graphics Driver

  • Available for: macOS Sonoma
  • Impact: Processing a maliciously crafted texture may lead to unexpected app termination
  • Description: An out-of-bounds read was addressed with improved bounds checking.
  • CVE-2024-44161: Michael DePlante (@izobashi) of Trend Micro Zero Day Initiative

IOSurfaceAccelerator

  • Available for: macOS Sonoma
  • Impact: An app may be able to cause unexpected system termination
  • Description: The issue was addressed with improved memory handling.
  • CVE-2024-44169: Antonio Zekić

Kernel
Available for: macOS Sonoma
Impact: Network traffic may leak outside a VPN tunnel
Description: A logic issue was addressed with improved checks.
CVE-2024-44165: Andrew Lytvynov

Mail Accounts

  • Available for: macOS Sonoma
  • Impact: An app may be able to access information about a user's contacts
  • Description: A privacy issue was addressed with improved private data redaction for log entries.
  • CVE-2024-40791: Rodolphe BRUNETTI (@eisw0lf)

Maps

  • Available for: macOS Sonoma
  • Impact: An app may be able to read sensitive location information
  • Description: An issue was addressed with improved handling of temporary files.
  • CVE-2024-44181: Kirin(@Pwnrin) and LFY(@secsys) from Fudan University

mDNSResponder

  • Available for: macOS Sonoma
  • Impact: An app may be able to cause a denial-of-service
  • Description: A logic error was addressed with improved error handling.
  • CVE-2024-44183: Olivier Levon

Notes

  • Available for: macOS Sonoma
  • Impact: An app may be able to overwrite arbitrary files
  • Description: This issue was addressed by removing the vulnerable code.
  • CVE-2024-44167: ajajfxhj

PackageKit

  • Available for: macOS Sonoma
  • Impact: An app may be able to modify protected parts of the file system
  • Description: This issue was addressed with improved validation of symlinks.
  • CVE-2024-44178: Mickey Jin (@patch1t)

Safari

  • Available for: macOS Sonoma
  • Impact: Visiting a malicious website may lead to user interface spoofing
  • Description: This issue was addressed through improved state management.
  • CVE-2024-40797: Rifa'i Rejal Maynando

Sandbox

  • Available for: macOS Sonoma
  • Impact: A malicious application may be able to access private information
  • Description: The issue was addressed with improved checks.
  • CVE-2024-44163: Zhongquan Li (@Guluisacat)

Sandbox

  • Available for: macOS Sonoma
  • Impact: A malicious application may be able to leak sensitive user information
  • Description: The issue was addressed with improved checks.
  • CVE-2024-44125: Zhongquan Li (@Guluisacat)

Security Initialization

  • Available for: macOS Sonoma
  • Impact: An app may be able to access protected user data
  • Description: A permissions issue was addressed with additional restrictions.
  • CVE-2024-40801: Zhongquan Li (@Guluisacat), Pedro José Pereira Vieito (@pvieito), an anonymous researcher

Shortcuts

  • Available for: macOS Sonoma
  • Impact: A shortcut may output sensitive user data without consent
  • Description: This issue was addressed with improved redaction of sensitive information.
  • CVE-2024-44158: Kirin (@Pwnrin)

Shortcuts

  • Available for: macOS Sonoma
  • Impact: An app may be able to observe data displayed to the user by Shortcuts
  • Description: A privacy issue was addressed with improved handling of temporary files.
  • CVE-2024-40844: Kirin (@Pwnrin) and luckyu (@uuulucky) of NorthSea

sudo

  • Available for: macOS Sonoma
  • Impact: An app may be able to modify protected parts of the file system
  • Description: A logic issue was addressed with improved checks.
  • CVE-2024-40860: Arsenii Kostromin (0x3c3e)

System Settings

  • Available for: macOS Sonoma
  • Impact: An app may be able to access user-sensitive data
  • Description: A privacy issue was addressed with improved private data redaction for log entries.
  • CVE-2024-44166: Kirin (@Pwnrin) and LFY (@secsys) from Fudan University

System Settings

  • Available for: macOS Sonoma
  • Impact: An app may be able to read arbitrary files
  • Description: A path handling issue was addressed with improved validation.
  • CVE-2024-44190: Rodolphe BRUNETTI (@eisw0lf)

Transparency

  • Available for: macOS Sonoma
  • Impact: An app may be able to access user-sensitive data
  • Description: A permissions issue was addressed with additional restrictions.
  • CVE-2024-44184: Bohdan Stasiuk (@Bohdan_Stasiuk)
Version: macOS Sonoma 14.7 Link
Receive Important Update Messages Stay tuned for upcoming Apple macOS updates

Was the content helpful to you?

Advertisement Advertise here?
Udemy IT certification ad