About the security content of macOS Sequoia 15.2 – Apple Support

About the security content of macOS Sequoia 15.2 - Apple Support

December 11, 2024 at 01:33PM

Multiple security vulnerabilities have been identified in macOS Sequoia 15.2. Issues range from unauthorized access to user data, memory handling problems, and permissions misconfigurations. Updates have been made to address these vulnerabilities, enhancing overall system security. The release date for the update is set for December 11, 2024.

### Meeting Notes Takeaways:

**Release Information:**
– **Apple ID:** 121839
– **Release Date:** December 11, 2024
– **Affected Product:** macOS Sequoia 15.2

**Security Vulnerabilities Addressed:**

1. **CVE-2024-54477**
– **Description:** Improved checks.
– **Impact:** Potential app access to user-sensitive data.

2. **CVE-2024-44220, CVE-2024-54526, CVE-2024-54527**
– **Description:** Improved checks.
– **Impact:** Potential app access to sensitive user data.

3. **CVE-2024-54490**
– **Description:** Hardened runtime enabled.
– **Impact:** Local attacker may access user’s Keychain items.

4. **CVE-2024-54529, CVE-2024-54513**
– **Description:** Additional restrictions for permissions issue.
– **Impact:** Potential app access to sensitive user data.

5. **CVE-2024-44300**
– **Description:** Improved file handling logic.
– **Impact:** Potential app access to protected user data.

6. **CVE-2024-54466**
– **Description:** Improved state management for authorization.
– **Impact:** Other users may access an encrypted volume without a password.

7. **CVE-2024-54489**
– **Description:** Improved path handling validation.
– **Impact:** Possible execution of arbitrary code from mount command.

8. **CVE-2024-54486**
– **Description:** Improved checks on font processing.
– **Impact:** Possible disclosure of process memory.

9. **CVE-2024-44291**
– **Description:** Improved file handling logic.
– **Impact:** Malicious app may gain root privileges.

10. **CVE-2024-54500**
– **Description:** Improved checks on image processing.
– **Impact:** Potential memory disclosure.

11. **CVE-2024-54495 to CVE-2024-54505**
– **Description:** Improved memory handling addressing type confusion.
– **Impact:** Memory corruption due to malicious web content.

12. **CVE-2024-44225**
– **Description:** Improved checks to prevent privilege escalation.
– **Impact:** Possible elevated privileges for an app.

13. **CVE-2024-54491**
– **Description:** Logging sanitized.
– **Impact:** Malicious application may determine user location.

14. **CVE-2024-54484**
– **Description:** Logging sanitized.
– **Impact:** Access to user-sensitive data.

15. **CVE-2024-54474, CVE-2024-54476**
– **Description:** Improved checks.
– **Impact:** Potential app access to user-sensitive data.

16. **CVE-2024-54492**
– **Description:** HTTPS used for network communication.
– **Impact:** Prevents alteration of network traffic by attackers.

17. **CVE-2024-44246**
– **Description:** Improved routing for Safari requests.
– **Impact:** IP address exposure when adding websites to Reading List on Private Relay-enabled devices.

18. **CVE-2024-54495 to CVE-2024-54534**
– **Description:** Continued improvements in memory handling.
– **Impact:** Addresses various potential memory corruption scenarios.

**Note:** The updates available are specifically for **macOS Sequoia** version 15.2 and address multiple vulnerabilities primarily focused on enhancing user data protection, improving checks, and addressing permissions issues.

Full Article