Why would you update to the new OS ?Why would I update when the new os coming out in 2 weeks time
Why would you update to the new OS ?Why would I update when the new os coming out in 2 weeks time
But that wasn't the question. There's no reason to install Ventura for Ventura's sake, so the question is whether or not the vuln exists in Monterey.Apple recently clarified that only the latest OS version will get ALL security updates. They also have had a few times where they've released security patches for the latest OS and then days later released a patch for older versions.
RSRs patch things like WebKit, that don’t touch the kernel/SSV. While it hasn’t happened yet, theoretically we could eventually see a particular RSR that didn’t even require a restart.It's unclear when Apple decides to issue Rapid Security Response (RSR) updates.
You can read more here:
About Rapid Security Responses for iOS, iPadOS, and macOS - Apple Support (CA)
Rapid Security Responses deliver important security improvements between software updates.support.apple.com
And the list of releases here:
Apple security releases - Apple Support (CA)
This document lists security updates and Rapid Security Responses for Apple software.support.apple.com
The last RSR update was mid-July. Sounds this exploit fix in today's update should have been issued as an RSR, too.
For those of us who are stuck on an unsupported Mac OS version due to financial reasons, any details on how this image exploit is used so we can try to avoid it? Is it as simple as someone emailing you an image embedded into the body? Or an attachment you have to open?
Because lots of bugs gets worked out during the first few point releases. That applies not just to the OS, but also to the apps that have been updated to run on it. Thus many of us don't like to update until at least X.3 or X.4. in addition, some people rely on software that's not able to run at all on the new OS on day 1.Why would I update when the new os coming out in 2 weeks time
No this is the one that craters battery life. Sorry slow and buggy 16.6.4Is this the one that slows down my phone and makes it buggy so I wanna buy a new one?
I used to get 2-3 years out of a computer. And had to pay for OS and software upgrades.My elderly parents' 2013 iMac stopped getting updates - one thing I did was stop using Safari and making Chrome the default browser, since Chrome continues to get updates. No idea if that helps for this particular security issue. I also removed Administrator privileges from their accounts - they have to log in as another account to do Administrator things.
Eventually, a few months ago M2 mac mini went on sale for $499 on Amazon (I believe it is now) and I replaced their old iMac to stop worrying.
Don't blame Windows for Dell and/or Lenovo bloatware. Those are the things that take forever to update, not Windows.I call B.S.!! Every time I have to unpack a DELL or Lenovo or any other PC in this IT world, I have to run updates 2 or 3 times because it can't do it at once and no way is it 5 times faster.
If your house is on fire you don’t wait 2 weeks to call 911Why would I update when the new os coming out in 2 weeks time
A few have asked that already about this exploit. I checked Citizen Lab's website, and it doesn't seem an answer is available. It's possible that it does affect earlier OS's, and it's also possible updates to the two earlier OS's that still get security patches (Big Sur and Monterey) will follow. We don't know.What happens with old versions of the OS that people may still be running? Are they vulnerable to all these sort of things? Does Apple just leave people stranded if they are using an old product? Not even providing basic security updates to an old OS.
No, it doesn’t read like that at all. These exploits are always highly specific, but the language used in the security overview pages is general. See the link to the citizen lab page above for more information (although not much is shared yet).No further details have been published so far, but it reads like any processing of an image by ImageIO can trigger an exploit. That almost certainly includes displaying images in an email.
Software is hard and parts of the codebase are old. These are new exploits each time.Why is it always this exact phrasing on the exploit and why can't it ever be fully fixed? It's always "a maliciously crafted image could lead to arbitrary code execution."
Nah, the rapid security response updates.Assuming you are talking about XProtect and MRT, think of those as Antivirus software. They look for specific application or signatures that may be running on your computer and prevent the process from running. But Apple only updates for known malware.
These patches are patching an exploit in the Operating System, thus preventing new malware from attacking the exploit,.
I am curious about the 17 beta status too.
Anyone? Is there any way to test for the presence of the vulnerability at least?I wish they’d confirm if this is already patched on the latest 17.0 beta‘s or not...
I can’t find clarification on that anywhere…
I used to get 2-3 years out of a computer. And had to pay for OS and software upgrades.
Desktop PCs are surprisingly useful unlike their laptop counterparts. Currently running an old quad core HP prebuilt from 2009 or so as a HTPC with SSD/16gb RAM upgrade and is still supported by security updates to 2025 without any need for OCLP/patchers. It’s fast enough for basic tasks (youtube, streaming, browsing, etc) thanks to GPU-acceleration.Zero chance a PC from 10 years ago would still have been around and usable.
Why would I update when the new os coming out in 2 weeks time