Already I’m seeing social media channels fill up with Apple users whining about the 2GB or larger download required for OSX 12.4.
Why should I download this if there are no major changes?
Deployment model plans aside — proprietary lightning connectors are nearly dinosaur speed versus modern USB-C so Apple arguably put themselves in this corner — let’s talk about what Apple doesn’t seem to highlight in its official release notes: data safety (CRITICALITY OF FIXES).
- CVE-2022-26772 memory corruption to execute arbitrary code with kernel privileges
- CVE-2022-26741 buffer overflow to execute arbitrary code with kernel privileges
- CVE-2022-26742 buffer overflow to execute arbitrary code with kernel privileges
- CVE-2022-26749 buffer overflow to execute arbitrary code with kernel privileges
- CVE-2022-26750 buffer overflow to execute arbitrary code with kernel privileges
- CVE-2022-26752 buffer overflow to execute arbitrary code with kernel privileges
- CVE-2022-26753 buffer overflow to execute arbitrary code with kernel privileges
- CVE-2022-26754 buffer overflow to execute arbitrary code with kernel privileges
- CVE-2021-44224 “multiple issues”
- CVE-2021-44790 “multiple issues”
- CVE-2021-44719 “multiple issues”
- CVE-2022-22720 “multiple issues”
- CVE-2022-22721 “multiple issues”
- CVE-2022-26697 out-of-bounds read for unexpected application termination or disclosure of process memory
- CVE-2022-26698 out-of-bounds read for unexpected application termination or disclosure of process memory
- CVE-2022-26736 out-of-bounds write to execute arbitrary code with kernel privileges
- CVE-2022-26737 out-of-bounds write to execute arbitrary code with kernel privileges
- CVE-2022-26738 out-of-bounds write to execute arbitrary code with kernel privileges
- CVE-2022-26739 out-of-bounds write to execute arbitrary code with kernel privileges
- CVE-2022-26740 out-of-bounds write to execute arbitrary code with kernel privileges
- CVE-2022-26694 inherit app permissions and access user data
- CVE-2022-26721 memory initialization to gain root privileges
- CVE-2022-26722 memory initialization to gain root privileges
- CVE-2022-26763 out-of-bounds access to execute arbitrary code with system privileges
- CVE-2022-26711 integer overflow to cause unexpected application termination or arbitrary code execution
- CVE-2022-26725 location information may persist after it is removed
- CVE-2022-26720 out-of-bounds write to execute arbitrary code with kernel privileges
- CVE-2022-26769 memory corruption to execute arbitrary code with kernel privileges
- CVE-2022-26770 out-of-bounds read to execute arbitrary code with kernel privileges
- CVE-2022-26748 out-of-bounds write for arbitrary code execution
- CVE-2022-26756 out-of-bounds to execute arbitrary code with kernel privileges
- CVE-2022-26701 race condition to execute arbitrary code with kernel privileges
- CVE-2022-26768 memory corruption to execute arbitrary code with kernel privileges
- CVE-2022-26743 out-of-bounds write to escalate to kernel privileges
- CVE-2022-26714 memory corruption to execute arbitrary code with kernel privileges
- CVE-2022-26757 use after free to execute arbitrary code with kernel privileges
- CVE-2022-26764 memory corruption to bypass kernel memory mitigations
- CVE-2022-26765 race condition to bypass Pointer Authentication
- CVE-2022-26706 access issue to circumvent sandbox restrictions
- CVE-2022-26767 to bypass Privacy preferences
- CVE-2022-26776 cause unexpected application termination or arbitrary code execution
- CVE-2022-26708 for unexpected application termination or arbitrary code execution
- CVE-2022-26775 integer overflow to cause unexpected application termination or arbitrary code execution
- CVE-2022-0778 invalid cert for denial of service
- CVE-2022-23308 use after free to cause unexpected application termination or arbitrary code execution
- CVE-2022-0778 invalid cert for denial of service
- CVE-2022-26712 vulnerable code to modify protected parts of the file system
- CVE-2022-26727 bypass entitlements to modify protected parts of the file system
- CVE-2022-26693 bypass checks to inherit application permissions and access user data
- CVE-2022-26746 vulnerable code to bypass Privacy preferences
- CVE-2022-26731 state management logic weakness to track users in Safari private browsing mode
- CVE-2022-26766 certificate parsing issue to bypass signature validation
- CVE-2022-26715 out-of-bounds write to gain elevated privileges
- CVE-2022-26718 out-of-bounds read to gain elevated privileges
- CVE-2022-26723 memory corruption for arbitrary code execution
- CVE-2022-26728 bypass entitlements to access restricted files
- CVE-2022-26704 validation issue to gain elevated privileges
- CVE-2022-26726 bypass checks to capture a user’s screen
- CVE-2022-26755 lack of sanitization to break out of a sandbox
- CVE-2022-26700 memory corruption for code execution
- CVE-2022-26709 use after free for arbitrary code execution
- CVE-2022-26710 use after free for arbitrary code execution
- CVE-2022-26717 use after free for arbitrary code execution
- CVE-2022-26716 memory corruption for arbitrary code execution
- CVE-2022-26719 memory corruption for arbitrary code execution
- CVE-2022-22677 logic issue so call may be interrupted
- CVE-2022-26745 memory corruption to disclose restricted memory
- CVE-2022-26761 memory corruption to execute arbitrary code with kernel privileges
- CVE-2022-26762 memory corruption to execute arbitrary code with system privileges
- CVE-2022-0530 bypass file state for denial of service
- CVE-2018-25032 memory corruption for unexpected application termination or arbitrary code execution
- CVE-2021-45444 arbitrary code execution
Whew! Even with sparse details and placeholder CVE records that’s still 24 mentions of kernel privileges and 2 root level. Can you figure out the one missing from this list?