About the security content of macOS Ventura 13.7.2

This document describes the security content of macOS Ventura 13.7.2.

About Apple security updates

For our customers' protection, Apple doesn't disclose, discuss, or confirm security issues until an investigation has occurred and patches or releases are available. Recent releases are listed on the Apple security releases page.

Apple security documents reference vulnerabilities by CVE-ID when possible.

For more information about security, see the Apple Product Security page.

macOS Ventura 13.7.2

Released December 11, 2024

Apple Software Restore

Available for: macOS Ventura

Impact: An app may be able to access user-sensitive data

Description: The issue was addressed with improved checks.

CVE-2024-54477: Mickey Jin (@patch1t), Csaba Fitzl (@theevilbit) of Kandji

AppleMobileFileIntegrity

Available for: macOS Ventura

Impact: An app may be able to access sensitive user data

Description: This issue was addressed with improved checks.

CVE-2024-54527: Mickey Jin (@patch1t)

AppleMobileFileIntegrity

Available for: macOS Ventura

Impact: A malicious app may be able to access private information

Description: The issue was addressed with improved checks.

CVE-2024-54526: Mickey Jin (@patch1t), Arsenii Kostromin (0x3c3e)

Audio

Available for: macOS Ventura

Impact: An app may be able to execute arbitrary code with kernel privileges

Description: A logic issue was addressed with improved checks.

CVE-2024-54529: Dillon Franke working with Google Project Zero

Crash Reporter

Available for: macOS Ventura

Impact: An app may be able to access protected user data

Description: A logic issue was addressed with improved file handling.

CVE-2024-44300: an anonymous researcher

DiskArbitration

Available for: macOS Ventura

Impact: An encrypted volume may be accessed by a different user without prompting for the password

Description: An authorization issue was addressed with improved state management.

CVE-2024-54466: Michael Cohen

Disk Utility

Available for: macOS Ventura

Impact: Running a mount command may unexpectedly execute arbitrary code

Description: A path handling issue was addressed with improved validation.

CVE-2024-54489: D’Angelo Gonzalez of CrowdStrike

FontParser

Available for: macOS Ventura

Impact: Processing a maliciously crafted font may result in the disclosure of process memory

Description: The issue was addressed with improved checks.

CVE-2024-54486: Hossein Lotfi (@hosselot) of Trend Micro Zero Day Initiative

ImageIO

Available for: macOS Ventura

Impact: Processing a maliciously crafted image may result in disclosure of process memory

Description: The issue was addressed with improved checks.

CVE-2024-54500: Junsung Lee working with Trend Micro Zero Day Initiative

Kernel

Available for: macOS Ventura

Impact: An attacker may be able to create a read-only memory mapping that can be written to

Description: A race condition was addressed with additional validation.

CVE-2024-54494: sohybbyk

Kernel

Available for: macOS Ventura

Impact: An app may be able to leak sensitive kernel state

Description: A race condition was addressed with improved locking.

CVE-2024-54510: Joseph Ravichandran (@0xjprx) of MIT CSAIL

libarchive

Available for: macOS Ventura

Impact: Processing a malicious crafted file may lead to a denial-of-service

Description: The issue was addressed with improved memory handling.

CVE-2024-44201: Ben Roeder

libexpat

Available for: macOS Ventura

Impact: A remote attacker may cause an unexpected app termination or arbitrary code execution

Description: This is a vulnerability in open source code and Apple Software is among the affected projects. The CVE-ID was assigned by a third party. Learn more about the issue and CVE-ID at cve.org.

CVE-2024-45490

libxpc

Available for: macOS Ventura

Impact: An app may be able to break out of its sandbox

Description: The issue was addressed with improved checks.

CVE-2024-54514: an anonymous researcher

libxpc

Available for: macOS Ventura

Impact: An app may be able to gain elevated privileges

Description: A logic issue was addressed with improved checks.

CVE-2024-44225: 风沐云烟(@binary_fmyy)

PackageKit

Available for: macOS Ventura

Impact: An app may be able to access user-sensitive data

Description: The issue was addressed with improved checks.

CVE-2024-54474: Mickey Jin (@patch1t)

CVE-2024-54476: Mickey Jin (@patch1t), Bohdan Stasiuk (@Bohdan_Stasiuk)

SceneKit

Available for: macOS Ventura

Impact: Processing a maliciously crafted file may lead to a denial of service

Description: The issue was addressed with improved checks.

CVE-2024-54501: Michael DePlante (@izobashi) of Trend Micro's Zero Day Initiative

Screen Sharing Server

Available for: macOS Ventura

Impact: A user with screen sharing access may be able to view another user's screen

Description: This issue was addressed through improved state management.

CVE-2024-44248: Halle Winkler, Politepix (theoffcuts.org)

SharedFileList

Available for: macOS Ventura

Impact: An app may be able to overwrite arbitrary files

Description: A logic issue was addressed with improved restrictions.

CVE-2024-54528: an anonymous researcher

SharedFileList

Available for: macOS Ventura

Impact: An app may be able to break out of its sandbox

Description: A path handling issue was addressed with improved validation.

CVE-2024-54498: an anonymous researcher

Software Update

Available for: macOS Ventura

Impact: A malicious app may be able to gain root privileges

Description: A logic issue was addressed with improved file handling.

CVE-2024-44291: Arsenii Kostromin (0x3c3e)

StorageKit

Available for: macOS Ventura

Impact: A malicious app may be able to gain root privileges

Description: A permissions issue was addressed with additional restrictions.

CVE-2024-44224: Amy (@asentientbot)

Additional recognition

CUPS

We would like to acknowledge evilsocket for their assistance.

Proximity

We would like to acknowledge Junming C. (@Chapoly1305) and Prof. Qiang Zeng of George Mason University for their assistance.

Sandbox

We would like to acknowledge IES Red Team of ByteDance for their assistance.

Information about products not manufactured by Apple, or independent websites not controlled or tested by Apple, is provided without recommendation or endorsement. Apple assumes no responsibility with regard to the selection, performance, or use of third-party websites or products. Apple makes no representations regarding third-party website accuracy or reliability. Contact the vendor for additional information.

Published Date: