• Apple on track to meet or break its 2021 tally of 12 zero day bugs

    From NewsKrawler@21:1/5 to All on Sat Apr 2 04:20:26 2022
    https://arstechnica.com/information-technology/2022/03/apple-rushes-out-patches-for-two-zero-days-threatening-ios-and-macos-users/
    It's raining down Apple zero-days.

    With 5 zero-days this year, Apple is on track to meet or break its 2021
    tally of 12 zero day bugs.

    Apple rushes out patches for two 0-days threatening iOS and macOS users=

    CVE-2022-22674 and CVE-2022-22675 are the fourth and fifth zero-days Apple
    has patched this year.

    In January, the company rushed out patches for iOS, iPadOS, macOS Monterey, watchOS, tvOS, and HomePod Software to fix a zero-day memory corruption flaw that could give exploiters the ability to execute code with kernel
    privileges.

    The bug, tracked as CVE-2022-22587, resided in the IOMobileFrameBuffer.

    A separate vulnerability, CVE-2022-22594, made it possible for websites to track sensitive user information. The exploit code for that vulnerability
    was released publicly prior to the patch being issued.

    Apple in February pushed out a fix for a use after free bug in the Webkit browser engine that gave attackers the ability to run malicious code on iPhones, iPads, and iPod Touches. Apple said that reports it received
    indicated the vulnerability-CVE-2022-22620 was likely actively exploited.

    A spreadsheet Google security researchers maintain to track zero-days shows Apple fixed a total of 12 such vulnerabilities in 2021.

    Among those was a flaw in iMessage that the Pegasus spyware framework was targeting using a zero-click exploit, meaning devices were infected merely
    by receiving a malicious message, without any user action required.

    Two zero-days that Apple patched in May made it possible for attackers to infect fully up-to-date devices.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Diesel Crook@21:1/5 to NewsKrawler on Sat Apr 2 12:03:39 2022
    On Friday, April 1, 2022 at 9:20:30 PM UTC-7, NewsKrawler wrote:
    https://arstechnica.com/information-technology/2022/03/apple-rushes-out-patches-for-two-zero-days-threatening-ios-and-macos-users/
    It's raining down Apple zero-days.

    With 5 zero-days this year, Apple is on track to meet or break its 2021
    tally of 12 zero day bugs.

    Apple rushes out patches for two 0-days threatening iOS and macOS users=

    CVE-2022-22674 and CVE-2022-22675 are the fourth and fifth zero-days Apple has patched this year.

    In January, the company rushed out patches for iOS, iPadOS, macOS Monterey, watchOS, tvOS, and HomePod Software to fix a zero-day memory corruption flaw that could give exploiters the ability to execute code with kernel privileges.

    The bug, tracked as CVE-2022-22587, resided in the IOMobileFrameBuffer.

    A separate vulnerability, CVE-2022-22594, made it possible for websites to track sensitive user information. The exploit code for that vulnerability
    was released publicly prior to the patch being issued.

    Apple in February pushed out a fix for a use after free bug in the Webkit browser engine that gave attackers the ability to run malicious code on iPhones, iPads, and iPod Touches. Apple said that reports it received indicated the vulnerability-CVE-2022-22620 was likely actively exploited.

    A spreadsheet Google security researchers maintain to track zero-days shows Apple fixed a total of 12 such vulnerabilities in 2021.

    Among those was a flaw in iMessage that the Pegasus spyware framework was targeting using a zero-click exploit, meaning devices were infected merely
    by receiving a malicious message, without any user action required.

    Two zero-days that Apple patched in May made it possible for attackers to infect fully up-to-date devices.


    Dropping support for command line holdovers is long overdue. Well... like
    I said, I know the flooder is Snit sock Digger Thomnson, who is a programmer but I don't know if it could be used to spam like this.

    Another successful Mac test. That is if you count utter failure as a success.

    This is something you should ask -hh.

    -hh can create a virtual machine. Makes Snit sock Digger Thomnson cry
    because he can not.


    -
    Live on Kickstarter https://forums.cabling-design.com/wireless/wifi-out-to-800-feet-329594-
    .htm
    Dustin Cook: Functional Illiterate Fraud

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Dusty Crook@21:1/5 to NewsKrawler on Sat Apr 2 17:08:03 2022
    On Friday, April 1, 2022 at 9:20:30 PM UTC-7, NewsKrawler wrote:
    https://arstechnica.com/information-technology/2022/03/apple-rushes-out-patches-for-two-zero-days-threatening-ios-and-macos-users/
    It's raining down Apple zero-days.

    With 5 zero-days this year, Apple is on track to meet or break its 2021
    tally of 12 zero day bugs.

    Apple rushes out patches for two 0-days threatening iOS and macOS users=

    CVE-2022-22674 and CVE-2022-22675 are the fourth and fifth zero-days Apple has patched this year.

    In January, the company rushed out patches for iOS, iPadOS, macOS Monterey, watchOS, tvOS, and HomePod Software to fix a zero-day memory corruption flaw that could give exploiters the ability to execute code with kernel privileges.

    The bug, tracked as CVE-2022-22587, resided in the IOMobileFrameBuffer.

    A separate vulnerability, CVE-2022-22594, made it possible for websites to track sensitive user information. The exploit code for that vulnerability
    was released publicly prior to the patch being issued.

    Apple in February pushed out a fix for a use after free bug in the Webkit browser engine that gave attackers the ability to run malicious code on iPhones, iPads, and iPod Touches. Apple said that reports it received indicated the vulnerability-CVE-2022-22620 was likely actively exploited.

    A spreadsheet Google security researchers maintain to track zero-days shows Apple fixed a total of 12 such vulnerabilities in 2021.

    Among those was a flaw in iMessage that the Pegasus spyware framework was targeting using a zero-click exploit, meaning devices were infected merely
    by receiving a malicious message, without any user action required.

    Two zero-days that Apple patched in May made it possible for attackers to infect fully up-to-date devices.


    Ryan Sullivan obviously has much proficiency to contribute and he could
    learn to share it. Regrettably this is I think the least appropriate group
    for doing that because most of what he will get back is moaning, double- crossing, and other drivel.

    He insists that he uses Android, while you know he never used it on the
    fly and actually pushed it. Shadow is a narcissistic idiot who repeatedly claims anyone who disagrees with Ryan Sullivan to be a sock and, still,
    he wants us to believe that is reasonable. Gotta be crack. This is something the mainstream media never covers.


    -
    "You'll notice how quickly he loses interest when everything is about
    him. He clearly wants the attention"
    Steven Petruzzellis, making the dumbest comment ever uttered.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Diesel Cook@21:1/5 to NewsKrawler on Sat Apr 2 21:54:05 2022
    On Friday, April 1, 2022 at 9:20:30 PM UTC-7, NewsKrawler wrote:
    https://arstechnica.com/information-technology/2022/03/apple-rushes-out-patches-for-two-zero-days-threatening-ios-and-macos-users/
    It's raining down Apple zero-days.

    With 5 zero-days this year, Apple is on track to meet or break its 2021
    tally of 12 zero day bugs.

    Apple rushes out patches for two 0-days threatening iOS and macOS users=

    CVE-2022-22674 and CVE-2022-22675 are the fourth and fifth zero-days Apple has patched this year.

    In January, the company rushed out patches for iOS, iPadOS, macOS Monterey, watchOS, tvOS, and HomePod Software to fix a zero-day memory corruption flaw that could give exploiters the ability to execute code with kernel privileges.

    The bug, tracked as CVE-2022-22587, resided in the IOMobileFrameBuffer.

    A separate vulnerability, CVE-2022-22594, made it possible for websites to track sensitive user information. The exploit code for that vulnerability
    was released publicly prior to the patch being issued.

    Apple in February pushed out a fix for a use after free bug in the Webkit browser engine that gave attackers the ability to run malicious code on iPhones, iPads, and iPod Touches. Apple said that reports it received indicated the vulnerability-CVE-2022-22620 was likely actively exploited.

    A spreadsheet Google security researchers maintain to track zero-days shows Apple fixed a total of 12 such vulnerabilities in 2021.

    Among those was a flaw in iMessage that the Pegasus spyware framework was targeting using a zero-click exploit, meaning devices were infected merely
    by receiving a malicious message, without any user action required.

    Two zero-days that Apple patched in May made it possible for attackers to infect fully up-to-date devices.


    Snit just wiped the floor with RonB (aka ronb). Yup. Sadly this is what
    we have to put up with. Jerks who have no reason for being here other
    than to attack Snit.

    RonB (aka ronb)'s done a pretty good job with a takeoff of the MaxCliqueDyn Maximum Clique algorithm to produce texts which are made to sound like
    a response from a previous post in the group. Thus, my first statement
    stands literal and correct. RonB (aka ronb) can take pleasure in the
    silence in the overflowing septic tank of my rubbish bin. When will RonB
    (aka ronb) support the assetion they've made copius times about me being
    a Snit sock?


    --
    My Snoring Solution https://www.bing.com/search?q=Steve+Petruzzellis%3A+narcissistic+bigot
    Dustin Cook is a functional illiterate fraud

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Steve Carroll@21:1/5 to Steve Carroll on Sun Apr 3 10:09:17 2022
    On Saturday, April 2, 2022 at 12:03:41 PM UTC-7, Steve Carroll wrote:
    On Friday, April 1, 2022 at 9:20:30 PM UTC-7, NewsKrawler wrote:
    https://arstechnica.com/information-technology/2022/03/apple-rushes-out-patches-for-two-zero-days-threatening-ios-and-macos-users/
    It's raining down Apple zero-days.

    With 5 zero-days this year, Apple is on track to meet or break its 2021 tally of 12 zero day bugs.

    Apple rushes out patches for two 0-days threatening iOS and macOS users=

    CVE-2022-22674 and CVE-2022-22675 are the fourth and fifth zero-days Apple has patched this year.

    In January, the company rushed out patches for iOS, iPadOS, macOS Monterey, watchOS, tvOS, and HomePod Software to fix a zero-day memory corruption flaw
    that could give exploiters the ability to execute code with kernel privileges.

    The bug, tracked as CVE-2022-22587, resided in the IOMobileFrameBuffer.

    A separate vulnerability, CVE-2022-22594, made it possible for websites to track sensitive user information. The exploit code for that vulnerability was released publicly prior to the patch being issued.

    Apple in February pushed out a fix for a use after free bug in the Webkit browser engine that gave attackers the ability to run malicious code on iPhones, iPads, and iPod Touches. Apple said that reports it received indicated the vulnerability-CVE-2022-22620 was likely actively exploited.

    A spreadsheet Google security researchers maintain to track zero-days shows Apple fixed a total of 12 such vulnerabilities in 2021.

    Among those was a flaw in iMessage that the Pegasus spyware framework was targeting using a zero-click exploit, meaning devices were infected merely by receiving a malicious message, without any user action required.

    Two zero-days that Apple patched in May made it possible for attackers to infect fully up-to-date devices.
    Dropping support for command line holdovers is long overdue. Well... like
    I said, I know the flooder is Snit sock Digger Thomnson, who is a programmer but I don't know if it could be used to spam like this.

    Another successful Mac test. That is if you count utter failure as a success.

    This is something you should ask -hh.

    -hh can create a virtual machine. Makes Snit sock Digger Thomnson cry
    because he can not.


    -
    Live on Kickstarter https://forums.cabling-design.com/wireless/wifi-out-to-800-feet-329594-
    .htm
    Dustin Cook: Functional Illiterate Fraud


    Well... like I said, I have a number of reasons for believing the flooder
    is Peter Kohlmann, who is a demonstrable Automator user but I don't know
    if it could be used to flood so much. You likely think Fluxbox handles
    the desktop well. Nope. Not compared to Windows. Why would you want to
    limit all scripts on Linux to what can be done on the competition? Snit
    Glasser has a LOT of experience to contribute and he wishes to give back
    to the community. Of course this is I think the least appropriate venue
    for doing that because much of response is insulting, double-crossing and
    other crap.

    --
    This broke the Internet https://www.asanet.org/sites/default/files/1975_annual_meeting_program.pdf Steve 'Narcissistic Bigot' Carroll

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Stefen - fretwizen@21:1/5 to - fretwizen on Mon Apr 4 23:55:14 2022
    On Saturday, April 2, 2022 at 12:03:41 PM UTC-7, Stefen - fretwizen wrote:
    On Friday, April 1, 2022 at 9:20:30 PM UTC-7, NewsKrawler wrote:
    https://arstechnica.com/information-technology/2022/03/apple-rushes-out-patches-for-two-zero-days-threatening-ios-and-macos-users/
    It's raining down Apple zero-days.

    With 5 zero-days this year, Apple is on track to meet or break its 2021 tally of 12 zero day bugs.

    Apple rushes out patches for two 0-days threatening iOS and macOS users=

    CVE-2022-22674 and CVE-2022-22675 are the fourth and fifth zero-days Apple has patched this year.

    In January, the company rushed out patches for iOS, iPadOS, macOS Monterey, watchOS, tvOS, and HomePod Software to fix a zero-day memory corruption flaw
    that could give exploiters the ability to execute code with kernel privileges.

    The bug, tracked as CVE-2022-22587, resided in the IOMobileFrameBuffer.

    A separate vulnerability, CVE-2022-22594, made it possible for websites to track sensitive user information. The exploit code for that vulnerability was released publicly prior to the patch being issued.

    Apple in February pushed out a fix for a use after free bug in the Webkit browser engine that gave attackers the ability to run malicious code on iPhones, iPads, and iPod Touches. Apple said that reports it received indicated the vulnerability-CVE-2022-22620 was likely actively exploited.

    A spreadsheet Google security researchers maintain to track zero-days shows Apple fixed a total of 12 such vulnerabilities in 2021.

    Among those was a flaw in iMessage that the Pegasus spyware framework was targeting using a zero-click exploit, meaning devices were infected merely by receiving a malicious message, without any user action required.

    Two zero-days that Apple patched in May made it possible for attackers to infect fully up-to-date devices.
    Dropping support for command line holdovers is long overdue. Well... like
    I said, I know the flooder is Snit sock Digger Thomnson, who is a programmer but I don't know if it could be used to spam like this.

    Another successful Mac test. That is if you count utter failure as a success.

    This is something you should ask -hh.

    -hh can create a virtual machine. Makes Snit sock Digger Thomnson cry
    because he can not.


    -
    Live on Kickstarter https://forums.cabling-design.com/wireless/wifi-out-to-800-feet-329594-
    .htm
    Dustin Cook: Functional Illiterate Fraud


    Don't get too arrogant, Jeff-Relf.Me, sometimes "your socks" are just that.
    I have a custom setup I use as well, but it's something you would not understand.

    Dropping support for Mac Classic is obvious. Proof Sandman accuses everyone
    of being Snit http://sandman.net/files/snit_circus.png.

    The teller of untruths does it every time. Then the deluge begins. Because
    the wimp just has to run to other groups.

    --
    "You'll notice how quickly he loses interest when everything is about
    him. He clearly wants the attention"
    Steven Petruzzellis, making the dumbest comment ever uttered.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Stefen - fretwizen@21:1/5 to - fretwizen on Tue Apr 5 00:59:29 2022
    On Saturday, April 2, 2022 at 5:08:06 PM UTC-7, Stefen - fretwizen wrote:
    On Friday, April 1, 2022 at 9:20:30 PM UTC-7, NewsKrawler wrote:
    https://arstechnica.com/information-technology/2022/03/apple-rushes-out-patches-for-two-zero-days-threatening-ios-and-macos-users/
    It's raining down Apple zero-days.

    With 5 zero-days this year, Apple is on track to meet or break its 2021 tally of 12 zero day bugs.

    Apple rushes out patches for two 0-days threatening iOS and macOS users=

    CVE-2022-22674 and CVE-2022-22675 are the fourth and fifth zero-days Apple has patched this year.

    In January, the company rushed out patches for iOS, iPadOS, macOS Monterey, watchOS, tvOS, and HomePod Software to fix a zero-day memory corruption flaw
    that could give exploiters the ability to execute code with kernel privileges.

    The bug, tracked as CVE-2022-22587, resided in the IOMobileFrameBuffer.

    A separate vulnerability, CVE-2022-22594, made it possible for websites to track sensitive user information. The exploit code for that vulnerability was released publicly prior to the patch being issued.

    Apple in February pushed out a fix for a use after free bug in the Webkit browser engine that gave attackers the ability to run malicious code on iPhones, iPads, and iPod Touches. Apple said that reports it received indicated the vulnerability-CVE-2022-22620 was likely actively exploited.

    A spreadsheet Google security researchers maintain to track zero-days shows Apple fixed a total of 12 such vulnerabilities in 2021.

    Among those was a flaw in iMessage that the Pegasus spyware framework was targeting using a zero-click exploit, meaning devices were infected merely by receiving a malicious message, without any user action required.

    Two zero-days that Apple patched in May made it possible for attackers to infect fully up-to-date devices.
    Ryan Sullivan obviously has much proficiency to contribute and he could
    learn to share it. Regrettably this is I think the least appropriate group for doing that because most of what he will get back is moaning, double- crossing, and other drivel.

    He insists that he uses Android, while you know he never used it on the
    fly and actually pushed it. Shadow is a narcissistic idiot who repeatedly claims anyone who disagrees with Ryan Sullivan to be a sock and, still,
    he wants us to believe that is reasonable. Gotta be crack. This is something the mainstream media never covers.


    -
    "You'll notice how quickly he loses interest when everything is about
    him. He clearly wants the attention"
    Steven Petruzzellis, making the dumbest comment ever uttered.


    Here are some of the scripted posts from Jonas Eklundh... the script
    adds a nonsense or irrelevant insult or accusation after most sentences
    and adds numbers to the text so he can better track his trolling:

    <https://groups.google.com/d/msg/comp.os.linux.advocacy/RZtEyvJr8HI/VcEqOk2qCgAJ>
    or <https://goo.gl/67NLfr>.

    You can see a run of three scripted flood posts from his primary account.

    From: Sandman <mr@sandman.net>
    Message-ID: <sandman-b7df8761d3b6831e96d5976e9e67f379@individual.net>
    X-Trace: individual.net +MPBYFbnugFd2iPraU5I9ABV/5ZlNHtqj79Ij19mAYCfL5sHI= User-Agent: Sandmania 2.0

    He also has them elsewhere, here are some examples:

    <https://groups.google.com/d/msg/comp.os.linux.advocacy/Xetqyi1T0F0/cvoqp3eqCgAJ>
    OR <https://goo.gl/jy0rsr>.

    <https://groups.google.com/d/msg/comp.os.linux.advocacy/10d0Emx_ABk/eN0r1_epCgAJ>
    OR <https://goo.gl/Rkz0PO>.

    On that one he has a run of two.

    And a longer and clearly scripted, content-free flood post:

    <https://groups.google.com/d/msg/comp.os.linux.advocacy/2WS3xlecnw8/lizfGLOnCgAJ>
    OR <https://goo.gl/t7cTHd>.

    And even more!

    <https://groups.google.com/d/msg/comp.os.linux.advocacy/cYutxNP1hWc/KZikieXECgAJ>
    OR <https://goo.gl/Z6G7Ic>

    <https://groups.google.com/d/msg/comp.os.linux.advocacy/RZtEyvJr8HI/6sJfxaDECgAJ>
    OR <https://goo.gl/mTXlFt>

    Lots more but that is enough to prove the point multiple times over.
    Sandman has been flooding not just with his Google accounts but with
    his standard account. ALL of those come from the same source I listed
    above and it is Sandman's standard account.

    Jonas Eklundh: busted.

    --
    I Left My Husband & Daughter At Home And THIS happened! https://gibiru.com/results.html?q=%22functional%20illiterate%20fraud%22 https://www.asanet.org/sites/default/files/1975_annual_meeting_program.pdf https://swisscows.com/web?query=steve%20carroll%20%22narcissistic%20bigot%22 Steve 'Narcissistic Bigot' Carroll

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)