Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
Apple recently clarified that only the latest OS version will get ALL security updates. They also have had a few times where they've released security patches for the latest OS and then days later released a patch for older versions.
But that wasn't the question. There's no reason to install Ventura for Ventura's sake, so the question is whether or not the vuln exists in Monterey.
 
It's unclear when Apple decides to issue Rapid Security Response (RSR) updates.

You can read more here:

And the list of releases here:

The last RSR update was mid-July. Sounds this exploit fix in today's update should have been issued as an RSR, too.
RSRs patch things like WebKit, that don’t touch the kernel/SSV. While it hasn’t happened yet, theoretically we could eventually see a particular RSR that didn’t even require a restart.

Edit: Howard Oakley, over at Eclecticlight, ventured the guess that, going forward, only Sonoma will get RSRs, as Ventura goes into maintenance mode.
 
Last edited:
For those of us who are stuck on an unsupported Mac OS version due to financial reasons, any details on how this image exploit is used so we can try to avoid it? Is it as simple as someone emailing you an image embedded into the body? Or an attachment you have to open?

My elderly parents' 2013 iMac stopped getting updates - one thing I did was stop using Safari and making Chrome the default browser, since Chrome continues to get updates. No idea if that helps for this particular security issue. I also removed Administrator privileges from their accounts - they have to log in as another account to do Administrator things.

Eventually, a few months ago M2 mac mini went on sale for $499 on Amazon (I believe it is now) and I replaced their old iMac to stop worrying.
 
Why would I update when the new os coming out in 2 weeks time
Because lots of bugs gets worked out during the first few point releases. That applies not just to the OS, but also to the apps that have been updated to run on it. Thus many of us don't like to update until at least X.3 or X.4. in addition, some people rely on software that's not able to run at all on the new OS on day 1.
 
Here's a posting by Citizen Lab:


According to this they reported the exploit sometime last week. This was an extremely fast turnaround time by Apple, which shows how seriously they took it.

The attack vector used by NSO were iMessages with a malicious Wallet pass. Lockdown mode blocks the attack.
 
My elderly parents' 2013 iMac stopped getting updates - one thing I did was stop using Safari and making Chrome the default browser, since Chrome continues to get updates. No idea if that helps for this particular security issue. I also removed Administrator privileges from their accounts - they have to log in as another account to do Administrator things.

Eventually, a few months ago M2 mac mini went on sale for $499 on Amazon (I believe it is now) and I replaced their old iMac to stop worrying.
I used to get 2-3 years out of a computer. And had to pay for OS and software upgrades.
 
  • Like
Reactions: mjs916
I call B.S.!! Every time I have to unpack a DELL or Lenovo or any other PC in this IT world, I have to run updates 2 or 3 times because it can't do it at once and no way is it 5 times faster.
Don't blame Windows for Dell and/or Lenovo bloatware. Those are the things that take forever to update, not Windows.
 
Finding available software

Software Update found the following new or updated software:

* Label: macOS Ventura 13.6-22G115

Title: macOS Ventura 13.6, Version: 13.6, Size: 877886KiB

Hmm.. (I'm on beta)
 
What happens with old versions of the OS that people may still be running? Are they vulnerable to all these sort of things? Does Apple just leave people stranded if they are using an old product? Not even providing basic security updates to an old OS.
 
What happens with old versions of the OS that people may still be running? Are they vulnerable to all these sort of things? Does Apple just leave people stranded if they are using an old product? Not even providing basic security updates to an old OS.
A few have asked that already about this exploit. I checked Citizen Lab's website, and it doesn't seem an answer is available. It's possible that it does affect earlier OS's, and it's also possible updates to the two earlier OS's that still get security patches (Big Sur and Monterey) will follow. We don't know.

All we know is what Apple's security update policies are, since Apple has announced these itself. Here they are for MacOS:

1) Current OS: Gets maximum attention. This is the only OS that gets RSR's (Rapid Security Responses; see https://support.apple.com/en-us/102657 )
2) Last two OS's: Also get security patches, but these may not be as thorough as those for the current OS.
3) Earlier OS's: No security patches.

Personally, I'm OK with this. I've sometimes deliberately kept Macs on old OS's for various reasons, but I practice careful browsing and email hygiene, and I'm not a journalist who's pissed off a repressive regime. While it's no guarantee, none of the anti-malware programs I run (Malware Bytes, FireEye) has ever detected an intrusion.
 
Last edited:
No further details have been published so far, but it reads like any processing of an image by ImageIO can trigger an exploit. That almost certainly includes displaying images in an email.
No, it doesn’t read like that at all. These exploits are always highly specific, but the language used in the security overview pages is general. See the link to the citizen lab page above for more information (although not much is shared yet).

Why is it always this exact phrasing on the exploit and why can't it ever be fully fixed? It's always "a maliciously crafted image could lead to arbitrary code execution."
Software is hard and parts of the codebase are old. These are new exploits each time.
 
Assuming you are talking about XProtect and MRT, think of those as Antivirus software. They look for specific application or signatures that may be running on your computer and prevent the process from running. But Apple only updates for known malware.

These patches are patching an exploit in the Operating System, thus preventing new malware from attacking the exploit,.
Nah, the rapid security response updates.
 
What is it about these seemingly minor security updates that causes the update to be several hundred MB to a GB or more and take 20-30 mins to install? They must be patching more than just the library that has the vulnerability, no?
 
it had downloaded on my mac mini pro M2 and updated really fast. I looked down at something and back up and it was installed. Mac Mini Pro 16GB 1TB. It makes my old BTO maxed out 2017 iMac feel so slow its a real surprise. (well the iMac died as the PSU fried)
 
  • Like
Reactions: asus389
I used to get 2-3 years out of a computer. And had to pay for OS and software upgrades.

They got their Late 2013 iMac shortly after it was released, to replace a Windows XP Dell that was no longer getting updates to windows XP :).

Their late 2013 iMac was slow as hell until I tore it apart and replaced HDD with SSD - I was surprised what a dramatic improvement that made, and it added years to its useful life. They were running the iMac almost 10 years - and would have happily kept doing so, if I didn't recommend m2 mac mini for them as a replacement. Zero chance a PC from 10 years ago would still have been around and usable.
 
Zero chance a PC from 10 years ago would still have been around and usable.
Desktop PCs are surprisingly useful unlike their laptop counterparts. Currently running an old quad core HP prebuilt from 2009 or so as a HTPC with SSD/16gb RAM upgrade and is still supported by security updates to 2025 without any need for OCLP/patchers. It’s fast enough for basic tasks (youtube, streaming, browsing, etc) thanks to GPU-acceleration.
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.