MacOS Ventura 13.6.7 (Fixes)
macOS Ventura 13.6.7
Improvements
Core Data
Available for: macOS Ventura
Impact: An app may be able to access sensitive user data
Description: An issue was addressed with improved validation of environment variables.
CVE-2024-27805: Kirin (@Pwnrin) and 小来来 (@Smi1eSEC)
Entry added June 10, 2024
CoreMedia
Available for: macOS Ventura
Impact: An app may be able to execute arbitrary code with kernel privileges
Description: The issue was addressed with improved checks.
CVE-2024-27817: pattern-f (@pattern_F_) of Ant Security Light-Year Lab
Entry added June 10, 2024
CoreMedia
Available for: macOS Ventura
Impact: Processing a file may lead to unexpected app termination or arbitrary code execution
Description: An out-of-bounds write issue was addressed with improved input validation.
CVE-2024-27831: Amir Bazine and Karsten König of CrowdStrike Counter Adversary Operations
Entry added June 10, 2024
Finder
Available for: macOS Ventura
Impact: An app may be able to read arbitrary files
Description: This issue was addressed through improved state management.
CVE-2024-27827: an anonymous researcher
Entry added June 10, 2024
IOHIDFamily
Available for: macOS Ventura
Impact: An unprivileged app may be able to log keystrokes in other apps including those using secure input mode
Description: This issue was addressed with additional entitlement checks.
CVE-2024-27799: an anonymous researcher
Entry added June 10, 2024
Kernel
Available for: macOS Ventura
Impact: An attacker that has already achieved kernel code execution may be able to bypass kernel memory protections
Description: The issue was addressed with improved memory handling.
CVE-2024-27840: an anonymous researcher
Entry added June 10, 2024
Maps
Available for: macOS Ventura
Impact: An app may be able to read sensitive location information
Description: A path handling issue was addressed with improved validation.
CVE-2024-27810: LFY@secsys of Fudan University
Entry added June 10, 2024
Messages
Available for: macOS Ventura
Impact: Processing a maliciously crafted message may lead to a denial-of-service
Description: This issue was addressed by removing the vulnerable code.
CVE-2024-27800: Daniel Zajork and Joshua Zajork
Entry added June 10, 2024
Metal
Available for: macOS Ventura
Impact: Processing a maliciously crafted file may lead to unexpected app termination or arbitrary code execution
Description: An out-of-bounds read was addressed with improved input validation.
CVE-2024-27802: Meysam Firouzi (@R00tkitsmm) working with Trend Micro Zero Day Initiative
Entry added June 10, 2024
PackageKit
Available for: macOS Ventura
Impact: An app may be able to modify protected parts of the file system
Description: This issue was addressed with improved validation of symlinks.
CVE-2024-27885: Mickey Jin (@patch1t)
Entry added June 10, 2024
PackageKit
Available for: macOS Ventura
Impact: An app may be able to elevate privileges
Description: This issue was addressed by removing the vulnerable code.
CVE-2024-27824: Pedro Tôrres (@t0rr3sp3dr0)
Entry added June 10, 2024
SharedFileList
Available for: macOS Ventura
Impact: An app may be able to elevate privileges
Description: A logic issue was addressed with improved checks.
CVE-2024-27843: Mickey Jin (@patch1t)
Entry added June 10, 2024
Shortcuts
Available for: macOS Ventura
Impact: A shortcut may be able to use sensitive data with certain actions without prompting the user
Description: The issue was addressed with improved checks.
CVE-2024-27855: an anonymous researcher
Entry added June 10, 2024
Spotlight
Available for: macOS Ventura
Impact: An app may be able to access sensitive user data
Description: This issue was addressed with improved environment sanitization.
CVE-2024-27806
Entry added June 10, 2024
StorageKit
Available for: macOS Ventura
Impact: A user may be able to elevate privileges
Description: An authorization issue was addressed with improved state management.
CVE-2024-27798: Yann GASCUEL of Alter Solutions
Entry added June 10, 2024
Sync Services
Available for: macOS Ventura
Impact: An app may be able to bypass Privacy preferences
Description: This issue was addressed with improved checks
CVE-2024-27847: Mickey Jin (@patch1t)
Entry added June 10, 2024
Voice Control
Available for: macOS Ventura
Impact: A user may be able to elevate privileges
Description: The issue was addressed with improved checks.
CVE-2024-27796: ajajfxhj
Entry added June 10, 2024