-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 APPLE-SA-05-12-2025-4 macOS Sonoma 14.7.6 macOS Sonoma 14.7.6 addresses the following issues. Information about the security content is also available at https://support.apple.com/122717. Apple maintains a Security Releases page at https://support.apple.com/100100 which lists recent software updates with security advisories. afpfs Available for: macOS Sonoma Impact: Connecting to a malicious AFP server may corrupt kernel memory Description: The issue was addressed with improved memory handling. CVE-2025-31246: Joseph Ravichandran (@0xjprx) of MIT CSAIL afpfs Available for: macOS Sonoma Impact: Mounting a maliciously crafted AFP network share may lead to system termination Description: This issue was addressed with improved checks. CVE-2025-31240: Dave G. CVE-2025-31237: Dave G. AppleJPEG Available for: macOS Sonoma Impact: Processing a maliciously crafted media file may lead to unexpected app termination or corrupt process memory Description: The issue was addressed with improved input sanitization. CVE-2025-31251: Hossein Lotfi (@hosselot) of Trend Micro Zero Day Initiative Audio Available for: macOS Sonoma Impact: An app may be able to cause unexpected system termination Description: A double free issue was addressed with improved memory management. CVE-2025-31235: Dillon Franke working with Google Project Zero CoreAudio Available for: macOS Sonoma Impact: Parsing a file may lead to an unexpected app termination Description: The issue was addressed with improved checks. CVE-2025-31208: Hossein Lotfi (@hosselot) of Trend Micro Zero Day Initiative CoreGraphics Available for: macOS Sonoma Impact: Processing a maliciously crafted file may lead to a denial-of- service or potentially disclose memory contents Description: An out-of-bounds read was addressed with improved input validation. CVE-2025-31196: wac working with Trend Micro Zero Day Initiative CoreGraphics Available for: macOS Sonoma Impact: Parsing a file may lead to disclosure of user information Description: An out-of-bounds read was addressed with improved bounds checking. CVE-2025-31209: Hossein Lotfi (@hosselot) of Trend Micro Zero Day Initiative CoreMedia Available for: macOS Sonoma Impact: Parsing a file may lead to an unexpected app termination Description: A use-after-free issue was addressed with improved memory management. CVE-2025-31239: Hossein Lotfi (@hosselot) of Trend Micro Zero Day Initiative CoreMedia Available for: macOS Sonoma Impact: Processing a maliciously crafted video file may lead to unexpected app termination or corrupt process memory Description: The issue was addressed with improved input sanitization. CVE-2025-31233: Hossein Lotfi (@hosselot) of Trend Micro Zero Day Initiative DiskArbitration Available for: macOS Sonoma Impact: A malicious app may be able to gain root privileges Description: The issue was addressed with additional permissions checks. CVE-2025-30453: Csaba Fitzl (@theevilbit) of Kandji, an anonymous researcher DiskArbitration Available for: macOS Sonoma Impact: An app may be able to gain root privileges Description: A permissions issue was addressed with additional restrictions. CVE-2025-24258: Csaba Fitzl (@theevilbit) of Kandji, an anonymous researcher iCloud Document Sharing Available for: macOS Sonoma Impact: An attacker may be able to turn on sharing of an iCloud folder without authentication Description: This issue was addressed with additional entitlement checks. CVE-2025-30448: Lyutoon and YenKoc, Dayton Pidhirney of Atredis Partners Installer Available for: macOS Sonoma Impact: A sandboxed app may be able to access sensitive user data Description: A logic issue was addressed with improved checks. CVE-2025-31232: an anonymous researcher Kernel Available for: macOS Sonoma Impact: An app may be able to leak sensitive kernel state Description: An information disclosure issue was addressed by removing the vulnerable code. CVE-2025-24144: Mateusz Krzywicki (@krzywix) Kernel Available for: macOS Sonoma Impact: An attacker may be able to cause unexpected system termination or corrupt kernel memory Description: The issue was addressed with improved memory handling. CVE-2025-31219: Michael DePlante (@izobashi) and Lucas Leong (@_wmliang_) of Trend Micro Zero Day Initiative Kernel Available for: macOS Sonoma Impact: A remote attacker may cause an unexpected app termination Description: A double free issue was addressed with improved memory management. CVE-2025-31241: Christian Kohlschütter libexpat Available for: macOS Sonoma Impact: Multiple issues in libexpat, including unexpected app termination or arbitrary code execution Description: This is a vulnerability in open source code and Apple Software is among the affected projects. The CVE-ID was assigned by a third party. Learn more about the issue and CVE-ID at cve.org. CVE-2024-8176 Libinfo Available for: macOS Sonoma Impact: An app may be able to bypass ASLR Description: The issue was addressed with improved checks. CVE-2025-30440: Paweł Płatek (Trail of Bits) mDNSResponder Available for: macOS Sonoma Impact: A user may be able to elevate privileges Description: A correctness issue was addressed with improved checks. CVE-2025-31222: Paweł Płatek (Trail of Bits) Mobile Device Service Available for: macOS Sonoma Impact: A malicious app may be able to gain root privileges Description: An input validation issue was addressed by removing the vulnerable code. CVE-2025-24274: an anonymous researcher Notification Center Available for: macOS Sonoma Impact: An app may be able to access sensitive user data Description: A privacy issue was addressed with improved private data redaction for log entries. CVE-2025-24142: LFY@secsys from Fudan University OpenSSH Available for: macOS Sonoma Impact: Multiple issues in OpenSSH Description: This is a vulnerability in open source code and Apple Software is among the affected projects. The CVE-ID was assigned by a third party. Learn more about the issue and CVE-ID at cve.org. CVE-2025-26465 CVE-2025-26466 Pro Res Available for: macOS Sonoma Impact: An app may be able to cause unexpected system termination Description: The issue was addressed with improved checks. CVE-2025-31245: wac Sandbox Available for: macOS Sonoma Impact: An app may be able to bypass certain Privacy preferences Description: A logic issue was addressed with improved checks. CVE-2025-31224: Csaba Fitzl (@theevilbit) of Kandji Security Available for: macOS Sonoma Impact: A remote attacker may be able to leak memory Description: An integer overflow was addressed with improved input validation. CVE-2025-31221: Dave G. Security Available for: macOS Sonoma Impact: An app may be able to access associated usernames and websites in a user's iCloud Keychain Description: A logging issue was addressed with improved data redaction. CVE-2025-31213: Kirin (@Pwnrin) and 7feilee SharedFileList Available for: macOS Sonoma Impact: An attacker may gain access to protected parts of the file system Description: A logic issue was addressed with improved state management. CVE-2025-31247: an anonymous researcher SoftwareUpdate Available for: macOS Sonoma Impact: An app may be able to gain elevated privileges Description: The issue was addressed with improved input sanitization. CVE-2025-30442: an anonymous researcher StoreKit Available for: macOS Sonoma Impact: An app may be able to access sensitive user data Description: A privacy issue was addressed with improved private data redaction for log entries. CVE-2025-31242: Eric Dorphy of Twin Cities App Dev LLC Weather Available for: macOS Sonoma Impact: A malicious app may be able to read sensitive location information Description: A privacy issue was addressed by removing sensitive data. CVE-2025-31220: Adam M. WebContentFilter Available for: macOS Sonoma Impact: An app may be able to disclose kernel memory Description: The issue was addressed with improved memory handling. CVE-2025-24155: an anonymous researcher Additional recognition Kernel We would like to acknowledge an anonymous researcher for their assistance. Shortcuts We would like to acknowledge Candace Jensen of Kandji, Chi Yuan Chang of ZUSO ART and taikosoup for their assistance. macOS Sonoma 14.7.6 may be obtained from the Mac App Store or Apple's Software Downloads web site: https://support.apple.com/downloads/ All information is also posted on the Apple Security Releases web site: https://support.apple.com/100100. This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEsz9altA7uTI+rE/qX+5d1TXaIvoFAmgico4ACgkQX+5d1TXa Ivpoqg//Sv9zuGWw5vVZFVehkEoFIzDOgL2l2R+z/9McvAMXnUcKAVnVBGL4pr5x jL/wKHWCRoQQtLQBJhalHXkD2Ih7M82q1G+LxMyamDOLX+dm0qdlDOkzQ5zTYKu7 7iWe2K/P4VLS6HoQLzSkr0A63uDeaVsUNdHJAHPrsYuY9Gh6gmWcR8B2DGzwkccx yCy9JzdolD0oEpD24yZNNhtLKqs+nsnley3WTiIgi54STOX2DCBASuNkaUFYvgDB vPkgQxI/hplGGMPKF/qPsw5C70pK37DVhzPSsjCQZ6sS63TUsTjs87+u9hdFup8w IV9tMWsCf6Vutjd9PVdxyCqWmWHLOHy5yBfc5JXTqA/kW3g11KO8UBrZbF67QwIm lE9ZYzOO8Si3y7YG5q7iaIouL+s4qP+0Fvqc+0AwcYOR1JKUuP9D4Qujl1HbThRf JA5MgF/K3DWH3m7H47oYCC6Nkf/+KYk6zwSQHTrJr0OBxtdLpXT+vig8LZcK5YTS R6osjDphpe17f8heabtFy9pIH20W4yrbtCcQ2zYoDMeJJbpCG8welMb+RVgnjPjI C+V+RPl781/snP+RMGU6DZEIAWcJsL2j7MhtW3xdzgEa3oD8wo0D9vfqgaY8/Emv tAAn6t/CWqXL5J/dKh+NJ4XXHyXvnH4uGIGTX1eCtrAde73BSqk= =bkwh -----END PGP SIGNATURE-----