Sunday, December 22, 2024

iOS 18.2 and macOS Sequoia 15.2 repair these safety points for iPhone and Mac

Apple frequently lists resolved vulnerabilities for iPhone, iPad, and Mac after every software program replace. Proper on cue, the corporate has launched an intensive listing of which safety resolutions are included in right now’s iOS 18.2 and macOS Sequoia 15.2 software program updates. As ever, we advocate updating as quickly as potential to guard your units from these safety dangers.

Listed below are the fastened offered right now for iPhone, iPad, and Mac:

iOS 18.2

AppleMobileFileIntegrity

Out there for: iPhone XS and later, iPad Professional 13-inch, iPad Professional 12.9-inch third technology and later, iPad Professional 11-inch 1st technology and later, iPad Air third technology and later, iPad seventh technology and later, and iPad mini fifth technology and later

Influence: A malicious app could possibly entry non-public info

Description: The difficulty was addressed with improved checks.

CVE-2024-54526: Mickey Jin (@patch1t), Arsenii Kostromin (0x3c3e)

AppleMobileFileIntegrity

Out there for: iPhone XS and later, iPad Professional 13-inch, iPad Professional 12.9-inch third technology and later, iPad Professional 11-inch 1st technology and later, iPad Air third technology and later, iPad seventh technology and later, and iPad mini fifth technology and later

Influence: An app could possibly entry delicate consumer knowledge

Description: This subject was addressed with improved checks.

CVE-2024-54527: Mickey Jin (@patch1t)

Audio

Out there for: iPhone XS and later, iPad Professional 13-inch, iPad Professional 12.9-inch third technology and later, iPad Professional 11-inch 1st technology and later, iPad Air third technology and later, iPad seventh technology and later, and iPad mini fifth technology and later

Influence: Muting a name whereas ringing might not lead to mute being enabled

Description: An inconsistent consumer interface subject was addressed with improved state administration.

CVE-2024-54503: Micheal Chukwu and an nameless researcher

Crash Reporter

Out there for: iPhone XS and later, iPad Professional 13-inch, iPad Professional 12.9-inch third technology and later, iPad Professional 11-inch 1st technology and later, iPad Air third technology and later, iPad seventh technology and later, and iPad mini fifth technology and later

Influence: An app could possibly entry delicate consumer knowledge

Description: A permissions subject was addressed with extra restrictions.

CVE-2024-54513: an nameless researcher

FontParser

Out there for: iPhone XS and later, iPad Professional 13-inch, iPad Professional 12.9-inch third technology and later, iPad Professional 11-inch 1st technology and later, iPad Air third technology and later, iPad seventh technology and later, and iPad mini fifth technology and later

Influence: Processing a maliciously crafted font might outcome within the disclosure of course of reminiscence

Description: The difficulty was addressed with improved checks.

CVE-2024-54486: Hossein Lotfi (@hosselot) of Pattern Micro Zero Day Initiative

ImageIO

Out there for: iPhone XS and later, iPad Professional 13-inch, iPad Professional 12.9-inch third technology and later, iPad Professional 11-inch 1st technology and later, iPad Air third technology and later, iPad seventh technology and later, and iPad mini fifth technology and later

Influence: Processing a maliciously crafted picture might lead to disclosure of course of reminiscence

Description: The difficulty was addressed with improved checks.

CVE-2024-54500: Junsung Lee working with Pattern Micro Zero Day Initiative

Kernel

Out there for: iPhone XS and later, iPad Professional 13-inch, iPad Professional 12.9-inch third technology and later, iPad Professional 11-inch 1st technology and later, iPad Air third technology and later, iPad seventh technology and later, and iPad mini fifth technology and later

Influence: An attacker could possibly create a read-only reminiscence mapping that may be written to

Description: A race situation was addressed with extra validation.

CVE-2024-54494: sohybbyk

Kernel

Out there for: iPhone XS and later, iPad Professional 13-inch, iPad Professional 12.9-inch third technology and later, iPad Professional 11-inch 1st technology and later, iPad Air third technology and later, iPad seventh technology and later, and iPad mini fifth technology and later

Influence: An app could possibly leak delicate kernel state

Description: A race situation was addressed with improved locking.

CVE-2024-54510: Joseph Ravichandran (@0xjprx) of MIT CSAIL

Kernel

Out there for: iPhone XS and later, iPad Professional 13-inch, iPad Professional 12.9-inch third technology and later, iPad Professional 11-inch 1st technology and later, iPad Air third technology and later, iPad seventh technology and later, and iPad mini fifth technology and later

Influence: An app could possibly trigger sudden system termination or corrupt kernel reminiscence

Description: The difficulty was addressed with improved reminiscence dealing with.

CVE-2024-44245: an nameless researcher

libexpat

Out there for: iPhone XS and later, iPad Professional 13-inch, iPad Professional 12.9-inch third technology and later, iPad Professional 11-inch 1st technology and later, iPad Air third technology and later, iPad seventh technology and later, and iPad mini fifth technology and later

Influence: A distant attacker might trigger an sudden app termination or arbitrary code execution

Description: This can be a vulnerability in open supply code and Apple Software program is among the many affected initiatives. The CVE-ID was assigned by a 3rd occasion. Study extra concerning the subject and CVE-ID at cve.org.

CVE-2024-45490

libxpc

Out there for: iPhone XS and later, iPad Professional 13-inch, iPad Professional 12.9-inch third technology and later, iPad Professional 11-inch 1st technology and later, iPad Air third technology and later, iPad seventh technology and later, and iPad mini fifth technology and later

Influence: An app could possibly escape of its sandbox

Description: The difficulty was addressed with improved checks.

CVE-2024-54514: an nameless researcher

libxpc

Out there for: iPhone XS and later, iPad Professional 13-inch, iPad Professional 12.9-inch third technology and later, iPad Professional 11-inch 1st technology and later, iPad Air third technology and later, iPad seventh technology and later, and iPad mini fifth technology and later

Influence: An app could possibly acquire elevated privileges

Description: A logic subject was addressed with improved checks.

CVE-2024-44225: 风沐云烟(@binary_fmyy)

Passwords

Out there for: iPhone XS and later, iPad Professional 13-inch, iPad Professional 12.9-inch third technology and later, iPad Professional 11-inch 1st technology and later, iPad Air third technology and later, iPad seventh technology and later, and iPad mini fifth technology and later

Influence: An attacker in a privileged community place could possibly alter community visitors

Description: This subject was addressed through the use of HTTPS when sending info over the community.

CVE-2024-54492: Talal Haj Bakry and Tommy Mysk of Mysk Inc. (@mysk_co)

Safari

Out there for: iPhone XS and later, iPad Professional 13-inch, iPad Professional 12.9-inch third technology and later, iPad Professional 11-inch 1st technology and later, iPad Air third technology and later, iPad seventh technology and later, and iPad mini fifth technology and later

Influence: On a tool with Personal Relay enabled, including an internet site to the Safari Studying Checklist might reveal the originating IP handle to the web site

Description: The difficulty was addressed with improved routing of Safari-originated requests.

CVE-2024-44246: Jacob Braun

SceneKit

Out there for: iPhone XS and later, iPad Professional 13-inch, iPad Professional 12.9-inch third technology and later, iPad Professional 11-inch 1st technology and later, iPad Air third technology and later, iPad seventh technology and later, and iPad mini fifth technology and later

Influence: Processing a maliciously crafted file might result in a denial of service

Description: The difficulty was addressed with improved checks.

CVE-2024-54501: Michael DePlante (@izobashi) of Pattern Micro’s Zero Day Initiative

VoiceOver

Out there for: iPhone XS and later, iPad Professional 13-inch, iPad Professional 12.9-inch third technology and later, iPad Professional 11-inch 1st technology and later, iPad Air third technology and later, iPad seventh technology and later, and iPad mini fifth technology and later

Influence: An attacker with bodily entry to an iOS system could possibly view notification content material from the lock display

Description: The difficulty was addressed by including extra logic.

CVE-2024-54485: Abhay Kailasia (@abhay_kailasia) from C-DAC Thiruvananthapuram India

WebKit

Out there for: iPhone XS and later, iPad Professional 13-inch, iPad Professional 12.9-inch third technology and later, iPad Professional 11-inch 1st technology and later, iPad Air third technology and later, iPad seventh technology and later, and iPad mini fifth technology and later

Influence: Processing maliciously crafted net content material might result in an sudden course of crash

Description: The difficulty was addressed with improved checks.

WebKit Bugzilla: 278497

CVE-2024-54479: Seunghyun Lee

WebKit Bugzilla: 281912

CVE-2024-54502: Brendon Tiszka of Google Undertaking Zero

WebKit

Out there for: iPhone XS and later, iPad Professional 13-inch, iPad Professional 12.9-inch third technology and later, iPad Professional 11-inch 1st technology and later, iPad Air third technology and later, iPad seventh technology and later, and iPad mini fifth technology and later

Influence: Processing maliciously crafted net content material might result in an sudden course of crash

Description: The difficulty was addressed with improved reminiscence dealing with.

WebKit Bugzilla: 282180

CVE-2024-54508: linjy of HKUS3Lab and chluo of WHUSecLab, Xiangwei Zhang of Tencent Safety YUNDING LAB

WebKit

Out there for: iPhone XS and later, iPad Professional 13-inch, iPad Professional 12.9-inch third technology and later, iPad Professional 11-inch 1st technology and later, iPad Air third technology and later, iPad seventh technology and later, and iPad mini fifth technology and later

Influence: Processing maliciously crafted net content material might result in reminiscence corruption

Description: A sort confusion subject was addressed with improved reminiscence dealing with.

WebKit Bugzilla: 282661

CVE-2024-54505: Gary Kwong

WebKit

Out there for: iPhone XS and later, iPad Professional 13-inch, iPad Professional 12.9-inch third technology and later, iPad Professional 11-inch 1st technology and later, iPad Air third technology and later, iPad seventh technology and later, and iPad mini fifth technology and later

Influence: Processing maliciously crafted net content material might result in reminiscence corruption

Description: The difficulty was addressed with improved reminiscence dealing with.

WebKit Bugzilla: 277967

CVE-2024-54534: Tashita Software program Safety

macOS 15.2

Apple Software program Restore

Out there for: macOS Sequoia

Influence: An app could possibly entry user-sensitive knowledge

Description: The difficulty was addressed with improved checks.

CVE-2024-54477: Mickey Jin (@patch1t), Csaba Fitzl (@theevilbit) of Kandji

AppleGraphicsControl

Out there for: macOS Sequoia

Influence: Parsing a maliciously crafted video file might result in sudden system termination

Description: The difficulty was addressed with improved reminiscence dealing with.

CVE-2024-44220: D4m0n

AppleMobileFileIntegrity

Out there for: macOS Sequoia

Influence: A malicious app could possibly entry non-public info

Description: The difficulty was addressed with improved checks.

CVE-2024-54526: Mickey Jin (@patch1t), Arsenii Kostromin (0x3c3e)

AppleMobileFileIntegrity

Out there for: macOS Sequoia

Influence: An app could possibly entry delicate consumer knowledge

Description: This subject was addressed with improved checks.

CVE-2024-54527: Mickey Jin (@patch1t)

AppleMobileFileIntegrity

Out there for: macOS Sequoia

Influence: A neighborhood attacker might acquire entry to consumer’s Keychain gadgets

Description: This subject was addressed by enabling hardened runtime.

CVE-2024-54490: Mickey Jin (@patch1t)

Audio

Out there for: macOS Sequoia

Influence: An app could possibly execute arbitrary code with kernel privileges

Description: A logic subject was addressed with improved checks.

CVE-2024-54529: Dillon Franke working with Google Undertaking Zero

Crash Reporter

Out there for: macOS Sequoia

Influence: An app could possibly entry delicate consumer knowledge

Description: A permissions subject was addressed with extra restrictions.

CVE-2024-54513: an nameless researcher

Crash Reporter

Out there for: macOS Sequoia

Influence: An app could possibly entry protected consumer knowledge

Description: A logic subject was addressed with improved file dealing with.

CVE-2024-44300: an nameless researcher

DiskArbitration

Out there for: macOS Sequoia

Influence: An encrypted quantity could also be accessed by a special consumer with out prompting for the password

Description: An authorization subject was addressed with improved state administration.

CVE-2024-54466: Michael Cohen

Disk Utility

Out there for: macOS Sequoia

Influence: Working a mount command might unexpectedly execute arbitrary code

Description: A path dealing with subject was addressed with improved validation.

CVE-2024-54489: D’Angelo Gonzalez of CrowdStrike

FontParser

Out there for: macOS Sequoia

Influence: Processing a maliciously crafted font might outcome within the disclosure of course of reminiscence

Description: The difficulty was addressed with improved checks.

CVE-2024-54486: Hossein Lotfi (@hosselot) of Pattern Micro Zero Day Initiative

Basis

Out there for: macOS Sequoia

Influence: A malicious app could possibly acquire root privileges

Description: A logic subject was addressed with improved file dealing with.

CVE-2024-44291: Arsenii Kostromin (0x3c3e)

ImageIO

Out there for: macOS Sequoia

Influence: Processing a maliciously crafted picture might lead to disclosure of course of reminiscence

Description: The difficulty was addressed with improved checks.

CVE-2024-54500: Junsung Lee working with Pattern Micro Zero Day Initiative

IOMobileFrameBuffer

Out there for: macOS Sequoia

Influence: An attacker could possibly trigger sudden system termination or arbitrary code execution in DCP firmware

Description: An out-of-bounds entry subject was addressed with improved bounds checking.

CVE-2024-54506: Ye Zhang (@VAR10CK) of Baidu Safety

Kernel

Out there for: macOS Sequoia

Influence: An attacker could possibly create a read-only reminiscence mapping that may be written to

Description: A race situation was addressed with extra validation.

CVE-2024-54494: sohybbyk

Kernel

Out there for: macOS Sequoia

Influence: An app could possibly leak delicate kernel state

Description: A race situation was addressed with improved locking.

CVE-2024-54510: Joseph Ravichandran (@0xjprx) of MIT CSAIL

Kernel

Out there for: macOS Sequoia

Influence: An app could possibly trigger sudden system termination or corrupt kernel reminiscence

Description: The difficulty was addressed with improved reminiscence dealing with.

CVE-2024-44245: an nameless researcher

Kernel

Out there for: macOS Sequoia

Influence: An app could possibly bypass kASLR

Description: The difficulty was addressed with improved reminiscence dealing with.

CVE-2024-54531: Hyerean Jang, Taehun Kim, and Youngjoo Shin

LaunchServices

Out there for: macOS Sequoia

Influence: An app could possibly elevate privileges

Description: A logic subject was addressed with improved state administration.

CVE-2024-54465: an nameless researcher

libexpat

Out there for: macOS Sequoia

Influence: A distant attacker might trigger an sudden app termination or arbitrary code execution

Description: This can be a vulnerability in open supply code and Apple Software program is among the many affected initiatives. The CVE-ID was assigned by a 3rd occasion. Study extra concerning the subject and CVE-ID at cve.org.

CVE-2024-45490

libxpc

Out there for: macOS Sequoia

Influence: An app could possibly escape of its sandbox

Description: The difficulty was addressed with improved checks.

CVE-2024-54514: an nameless researcher

libxpc

Out there for: macOS Sequoia

Influence: An app could possibly acquire elevated privileges

Description: A logic subject was addressed with improved checks.

CVE-2024-44225: 风沐云烟(@binary_fmyy)

Logging

Out there for: macOS Sequoia

Influence: A malicious software could possibly decide a consumer’s present location

Description: The difficulty was resolved by sanitizing logging

CVE-2024-54491: Kirin (@Pwnrin)

MediaRemote

Out there for: macOS Sequoia

Influence: An app could possibly entry user-sensitive knowledge

Description: The difficulty was resolved by sanitizing logging.

CVE-2024-54484: Meng Zhang (鲸落) of NorthSea

Notification Heart

Out there for: macOS Sequoia

Influence: An app could possibly entry user-sensitive knowledge

Description: A privateness subject was addressed with improved non-public knowledge redaction for log entries.

CVE-2024-54504: 神罚(@Pwnrin)

PackageKit

Out there for: macOS Sequoia

Influence: An app could possibly entry user-sensitive knowledge

Description: The difficulty was addressed with improved checks.

CVE-2024-54474: Mickey Jin (@patch1t)

CVE-2024-54476: Mickey Jin (@patch1t), Bohdan Stasiuk (@Bohdan_Stasiuk)

Passwords

Out there for: macOS Sequoia

Influence: An attacker in a privileged community place could possibly alter community visitors

Description: This subject was addressed through the use of HTTPS when sending info over the community.

CVE-2024-54492: Talal Haj Bakry and Tommy Mysk of Mysk Inc. (@mysk_co)

Perl

Out there for: macOS Sequoia

Influence: An app could possibly modify protected elements of the file system

Description: A logic subject was addressed with improved state administration.

CVE-2023-32395: Arsenii Kostromin (0x3c3e)

Safari

Out there for: macOS Sequoia

Influence: On a tool with Personal Relay enabled, including an internet site to the Safari Studying Checklist might reveal the originating IP handle to the web site

Description: The difficulty was addressed with improved routing of Safari-originated requests.

CVE-2024-44246: Jacob Braun

SceneKit

Out there for: macOS Sequoia

Influence: Processing a maliciously crafted file might result in a denial of service

Description: The difficulty was addressed with improved checks.

CVE-2024-54501: Michael DePlante (@izobashi) of Pattern Micro’s Zero Day Initiative

SharedFileList

Out there for: macOS Sequoia

Influence: A malicious app could possibly acquire root privileges

Description: A logic subject was addressed with improved restrictions.

CVE-2024-54515: an nameless researcher

SharedFileList

Out there for: macOS Sequoia

Influence: An app could possibly overwrite arbitrary recordsdata

Description: A logic subject was addressed with improved restrictions.

CVE-2024-54528: an nameless researcher

SharedFileList

Out there for: macOS Sequoia

Influence: A malicious app could possibly entry arbitrary recordsdata

Description: A logic subject was addressed with improved file dealing with.

CVE-2024-54524: an nameless researcher

SharedFileList

Out there for: macOS Sequoia

Influence: An app could possibly escape of its sandbox

Description: A path dealing with subject was addressed with improved validation.

CVE-2024-54498: an nameless researcher

Shortcuts

Out there for: macOS Sequoia

Influence: Privateness indicators for microphone entry could also be attributed incorrectly

Description: This subject was addressed by improved state administration.

CVE-2024-54493: Yokesh Muthu Ok

StorageKit

Out there for: macOS Sequoia

Influence: An app could possibly modify protected elements of the file system

Description: A configuration subject was addressed with extra restrictions.

CVE-2024-44243: Mickey Jin (@patch1t), Jonathan Bar Or (@yo_yo_yo_jbo) of Microsoft

StorageKit

Out there for: macOS Sequoia

Influence: A malicious app could possibly acquire root privileges

Description: A permissions subject was addressed with extra restrictions.

CVE-2024-44224: Amy (@asentientbot)

Swift

Out there for: macOS Sequoia

Influence: An app could possibly modify protected elements of the file system

Description: The difficulty was addressed with improved permissions logic.

CVE-2024-54495: Claudio Bozzato and Francesco Benvenuto of Cisco Talos, Arsenii Kostromin (0x3c3e)

WebKit

Out there for: macOS Sequoia

Influence: Processing maliciously crafted net content material might result in an sudden course of crash

Description: The difficulty was addressed with improved checks.

WebKit Bugzilla: 278497

CVE-2024-54479: Seunghyun Lee

WebKit Bugzilla: 281912

CVE-2024-54502: Brendon Tiszka of Google Undertaking Zero

WebKit

Out there for: macOS Sequoia

Influence: Processing maliciously crafted net content material might result in an sudden course of crash

Description: The difficulty was addressed with improved reminiscence dealing with.

WebKit Bugzilla: 282180

CVE-2024-54508: linjy of HKUS3Lab and chluo of WHUSecLab, Xiangwei Zhang of Tencent Safety YUNDING LAB

WebKit

Out there for: macOS Sequoia

Influence: Processing maliciously crafted net content material might result in reminiscence corruption

Description: A sort confusion subject was addressed with improved reminiscence dealing with.

WebKit Bugzilla: 282661

CVE-2024-54505: Gary Kwong

WebKit

Out there for: macOS Sequoia

Influence: Processing maliciously crafted net content material might result in reminiscence corruption

Description: The difficulty was addressed with improved reminiscence dealing with.

WebKit Bugzilla: 277967

CVE-2024-54534: Tashita Software program Safety

Apple offers extra recognition for each iOS 18.2 and macOS 15.2 safety fixes.

ʟᴀᴛᴇꜱᴛ ᴀᴘᴘʟᴇ ᴀᴄᴄᴇꜱꜱᴏʀʏ ʀᴇᴄᴏᴍᴍᴇɴᴅᴀᴛɪᴏɴꜱ

Comply with Zac: X, Bluesky, Instagram / Store Apple on Amazon to assist my work 🙏

FTC: We use revenue incomes auto affiliate hyperlinks. Extra.


Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles