macOS Monterey and macOS Big Sur receive a security update

After Apple has finally released macOS Ventura, with many of the features that have been tested in the Beta phases, new features are announced for macOS Monterey and macOS Big Sur. These two operating systems have just received new security features, which logically have been absorbed by macOS Ventura. But it is true that you probably do not want to update right now until you see how it works and that there are no problems. Of course, it may also be that you cannot update to the latest version. Be that as it may, if you have macOS Monterey or macOS Big Sur, you must upgrade. 

With the release of macOS Ventura, it is assumed that any existing vulnerability prior to that release has been corrected with this new version. However, if you have a newly released Mac with an older operating system, it likely has security flaws. That is why both macOS Monterey and macOS Big Sur must be updated as soon as possible. Specifically, this new security update patches three vulnerabilities found. Especially problems with AppleMobileFileIntegrity, Ruby and Sandbox systems.

Regarding AppleMobileFileIntegrity, what is mentioned in the notes issued by Apple, is that an application could modify protected parts of the file system. Regarding Ruby, the possibility that a remote user could cause the application to crash or execute arbitrary code. Finally, in Sandbox, fixes the possibility that an application with root privileges could access private information.

So now you know, if you are one of those who have one of these two operating systems and at the moment you do not want or cannot install macOS Ventura, updates in order to have a more secure environment and to distance as much as possible the possible security leaks that can cause many problems.


Be the first to comment

Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: Miguel Ángel Gatón
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.