Is it just me (or is Apple's latest update 26.1 stonewalling the gates)?

Discussion in 'Mac / Hackintosh' started by audiol0ver, Nov 12, 2025 at 7:47 PM.

  1. audiol0ver

    audiol0ver Noisemaker

    Joined:
    Dec 21, 2016
    Messages:
    42
    Likes Received:
    3
    I did not (yet) upgrade my system to the latest macOS update (Tahoe 26.1) because after taking a look at the change log and security notes (see https://support.apple.com/en-us/125634) I am suspecting that installations from the sister site could become heavily affected. Almost the entire article lists measures to tighten apple's security architecture, which could make it very difficult or impossible to install certain software.

    Could one of you wonderful people who knows the subject (keywords like codesigning, gatekeeper, symlinks, etc.) take a look at the measures to be implemented?
    I would like a recommendation on whether I should steer clear of this update or not.
    It would also be good to know whether releases and the steps during installation can be adapted to the stricter conditions if necessary.

    P.S. Please no blanket advice like “always avoid updates” – I already know that.
    Thanks in advance.
     
    • Interesting Interesting x 1
    • List
  2.  
  3. clone

    clone Audiosexual

    Joined:
    Feb 5, 2021
    Messages:
    9,493
    Likes Received:
    4,132
    They are bugs and vulnerabilities they are fixing with their regular updates. Each one gets its own CVE number as they get reported, tested and fixes added to the OS. Unless you see a specific CVE to look at, it appears entirely normal from them. If you look at the names of those who have submitted like "RedTeam", etc.; you can see they are mostly or completely security researchers.
     
  4. audiol0ver

    audiol0ver Noisemaker

    Joined:
    Dec 21, 2016
    Messages:
    42
    Likes Received:
    3
    Thanks for the fast reply. I read stuff like "Description: A downgrade issue affecting Intel-based Mac computers was addressed with additional code-signing restrictions. CVE-2025-43390..." and I know that this must directly affect some of the common k'ing methods.
    You surely remember the whole story about Pulsar Modular and removing the intel slice etc.
    Of course, Apple doesn't mention exactly which restrictions will be taken.
    And I start feeling insecure because I know it is good to keep the system up to date, but I hate those nasty surprises when the stuff that just worked suddely refuses to even launch.
    I would be very thankful if you (or one of the other knowing ladies & gentlemen) would take a closer look.
     
  5. clone

    clone Audiosexual

    Joined:
    Feb 5, 2021
    Messages:
    9,493
    Likes Received:
    4,132
    And how might you possibly know that? All you are looking at are patches for MacOS. They are usually all little stuff that has never even been found in the wild used for a zero day exploit. It's a brand new version of MacOS, and they probably still have less bugs to fix than the monthly Waves updates.
     
  6. saccamano

    saccamano Audiosexual

    Joined:
    Mar 26, 2023
    Messages:
    1,928
    Likes Received:
    838
    Location:
    CBGB omfug
    Trying not to use generalities here, but with that document (just as microsoft is on the win side) they are purposely being vague AF about every "bug" on that list. Microsoft takes it one step further wherein every patch is described with one or two simplistic catch-all blurbs about "this is a security flaw" or this is a "code fix for x,y,z". A lot of times they will reference a microsoft KB (microsoft knowledge base article) number that in many cases is either moved, or been assigned a different number, etc. If one is actually lucky enough to get to the correct KB article the verbiage used to describe the patch, or whatever it is they are wanting to install on your system, will again be purposely vague and cryptic.

    Take for example that first one on your list;
    "Admin Framework. The issue was addressed with improved checks." Doesn't tell you squat.

    Then there are "reference links" pointed BACK at the same page you initially got the CVE from...THEN it points to an "apple advisory" that lists another "reference article" pointing back to the page you started from...

    As the final coup de gras, they expect you to paw thru this list of "Child vulnerabilities".

    Child vulnerabilities
    (Contains the following vulnerabilities)
    CVE-2025-43471 CVE-2025-43322 CVE-2025-43455 CVE-2025-43447 CVE-2025-43462 CVE-2025-43390 CVE-2025-43388 CVE-2025-43466
    CVE-2025-43382 CVE-2025-43468 CVE-2025-43379 CVE-2025-43378 CVE-2025-43478 CVE-2025-43407 CVE-2025-43446 CVE-2025-43465
    CVE-2025-43423 CVE-2025-43497 CVE-2025-43394 CVE-2025-43448 CVE-2025-43395 CVE-2025-43461 CVE-2025-43426 CVE-2025-43401
    CVE-2025-43479 CVE-2025-43436 CVE-2025-43381 CVE-2025-43445 CVE-2025-43481 CVE-2025-43387 CVE-2025-43420 CVE-2025-43464
    CVE-2025-43498 CVE-2025-43507 CVE-2025-43348 CVE-2025-43474 CVE-2025-43396 CVE-2025-43444 CVE-2025-43467 CVE-2025-43398
    CVE-2025-43413 CVE-2025-43496 CVE-2025-43386 CVE-2025-43385 CVE-2025-43384 CVE-2025-43383 CVE-2025-43377 CVE-2025-43424
    CVE-2025-43364 CVE-2025-43506 CVE-2025-43389 CVE-2025-43469 CVE-2025-43411 CVE-2025-43405 CVE-2025-43391 CVE-2025-43393
    CVE-2024-43398 CVE-2024-49761 CVE-2025-6442 CVE-2025-43493 CVE-2025-43503 CVE-2025-43502 CVE-2025-43406 CVE-2025-43404
    CVE-2025-43500 CVE-2025-43335 CVE-2025-43408 CVE-2025-43476 CVE-2025-30465 CVE-2025-43414 CVE-2025-43473 CVE-2025-43499
    CVE-2025-43380 CVE-2025-43477 CVE-2025-43399 CVE-2025-43336 CVE-2025-43397 CVE-2025-43409 CVE-2025-43351 CVE-2025-43463
    CVE-2025-32462 CVE-2025-43334 CVE-2025-43412 CVE-2025-53906 CVE-2025-43480 CVE-2025-43458 CVE-2025-43430 CVE-2025-43427
    CVE-2025-43443 CVE-2025-43441 CVE-2025-43435 CVE-2025-43425 CVE-2025-43440 CVE-2025-43438 CVE-2025-43457 CVE-2025-43434
    CVE-2025-43433 CVE-2025-43431 CVE-2025-43432 CVE-2025-43429 CVE-2025-43421 CVE-2025-43392 CVE-2025-43373 CVE-2025-43402
    CVE-2025-43472

    By this time, if your head isn't spinning around like the exorcist girls', you're sorry you even tried to figure out what the initial patch was for...

    This is the way it is on both platforms. Trying to determine exactly what is being installed with these "updates" is almost impossible - the sheer length of the lists, the misdirection and purposefully cryptic language describing them being major factors in the design. They want the process of figuring out what it is they are installing made as difficult as possible. So when the application of all those updates in one session totally racks out your machine to the point where it's unusable, they can just say "well we told you all what it was we were installing", see?

    Your initial assessment that a significant quantity of stuff on that list has the potential to make it harder to run warez, or make personal privacy changes to the appleOS, is most likely correct. After all you are the end user, why should you have any say in what you want to run on your own machine? (purposely sarcastic)

    The crux of the biscuit is this; Asking someone else to figure this out is a full time job for that person(s). Most likely if you want real info on that list you can start by googleing the CVE numbers and see where it leads.
     
    Last edited: Nov 12, 2025 at 9:46 PM
Loading...
Similar Threads - Apple's latest update Forum Date
Apple's 2023 January Surprise Mac / Hackintosh Jan 17, 2023
Apple's afconvert creates m4a files with offset samples May 18, 2020
Apple's Switch from Intel Computer Hardware May 16, 2019
Steinberg released Cubase for Apple's iWatch Software News Apr 30, 2015
Some of my latest projects,enjoy! ;) Our Music Oct 10, 2025
Loading...