Most active commenters
  • wannacboatmovie(6)
  • chris_wot(3)
  • wtallis(3)

←back to thread

262 points fortran77 | 41 comments | | HN request time: 1.054s | source | bottom
Show context
acdha ◴[] No.42189685[source]
Interesting that they’re mentioned as only being exploited on Intel. Has anyone seen whether that’s because the attacker only targeted that platform or is it actually stopped by something like pointer protection?
replies(3): >>42189761 #>>42189809 #>>42189932 #
1. justinclift ◴[] No.42189809[source]
Doesn't seem to completely line up that they're rushing out iOS updates (ie for phones, etc) for something they're saying they've only confirmed on Intel cpus.

Unless they're assuming it's exploitable on Apple Silicon as well, or are being extra careful just in case.

replies(7): >>42189876 #>>42189883 #>>42190175 #>>42190448 #>>42190733 #>>42190776 #>>42190850 #
2. 2muchcoffeeman ◴[] No.42189876[source]
There must be millions of Intel Macs still around. Why wouldn’t they update it?
replies(2): >>42189894 #>>42189940 #
3. oddevan ◴[] No.42189883[source]
> Unless they're... being extra careful just in case.

That's where my money is.

replies(2): >>42190127 #>>42190431 #
4. shepherdjerred ◴[] No.42189894[source]
The parent comment said that Apple is rushing iOS updates. iOS is the operating system for iPhones which use Apple Silicon rather than Intel processors.
5. wannacboatmovie ◴[] No.42189940[source]
Well for starters, they stopped providing any updates for many perfectly functional Intel Macs years ago for no other reason than planned obsolescence. A side effect of the "they make both the hardware and software that's why it's better" paradigm.

Things like OpenCore Legacy Patcher prove it's possible; they just don't want to.

I don't think anyone feels entitled to new features in perpetuity. Security updates only would be fine thank you.

Don't tell me the richest company in the world can't pay for a couple of developers who just want to rest and vest to take care of and test the legacy platforms. A cushy job and you keep the customers happy.

Ironically the best way to stay safe on these computers is to install Windows or Linux.

replies(2): >>42190072 #>>42190100 #
6. StressedDev ◴[] No.42190072{3}[source]
Software needs longer support life cycles in general. I find it frustrating that organizations do not support operating systems, hardware, and applications for at least 10 years. Note Apple is one of the better organizations on this. Consumer router companies are notorious for shipping unpatched software. Here is what I would like to see:

1. All hardware and software should come with a highly visible end of support date.

2. All hardware and software should notify people when it is no longer receiving security patches. It should also explain to users why running unpatched software or hardware is dangerous.

replies(2): >>42190425 #>>42191523 #
7. threeseed ◴[] No.42190100{3}[source]
Sequoia is supported on most Intel Macs going back to 2018.

And it's far more than just a "couple of developers" to support older operating systems.

replies(4): >>42190136 #>>42190288 #>>42190415 #>>42190652 #
8. ajross ◴[] No.42190127[source]
Or they just don't know. Full analysis of an exploit usually takes days to weeks. It's possible it's only exploitable on x86, but equally possible that only the x86 version of the payload was discovered in the wild.
replies(1): >>42190542 #
9. chris_wot ◴[] No.42190136{4}[source]
Not on Macbook Airs that are only 3-5 years old though. We have a number that we plan on replacing after EOY, but we are still using for now. Can't get Sequoia.
replies(3): >>42190167 #>>42190514 #>>42200877 #
10. password4321 ◴[] No.42190167{5}[source]
Not really suitable for a corporate environment but in case you weren't aware:

https://github.com/dortania/OpenCore-Legacy-Patcher

macOS Big Sur and newer on machines as old as 2007

macOS Big Sur, Monterey, Ventura, Sonoma and Sequoia

replies(1): >>42190310 #
11. tedunangst ◴[] No.42190175[source]
It's not unheard of for exploits to target two or more bugs.
12. fouc ◴[] No.42190288{4}[source]
my favorite Intel MacBook is from 2015
13. chris_wot ◴[] No.42190310{6}[source]
Nice. Yeah, never going to fly here :( pity
14. wannacboatmovie ◴[] No.42190415{4}[source]
You act as if we should be thankful for 6 years of support when the hardware and sane support cycles easily exceed 10 years. And those aren't 6 years of security updates; they are 6 years of forced yearly feature upgrades and breaking things along the way.
replies(1): >>42190490 #
15. wannacboatmovie ◴[] No.42190425{4}[source]
To my knowledge Apple has never published EOL or support dates in the future. Someone correct me if something has changed in the last few years.
replies(1): >>42190513 #
16. ruthmarx ◴[] No.42190431[source]
Why? Putting a lot of stock in Apple's various protections?
17. bigiain ◴[] No.42190448[source]
> Apple is aware of a report that this issue may have been actively exploited on Intel-based Mac systems.

Is kinda weasel-wordy, if you read it with sufficient cynicism.

Its doesn't rule out them also being aware of reports (or actual instances) of it being exploited on iOS or Apple silicon Macs.

It _might_ actually mean "Apple could not deny in a lawsuit that it's been sent a report of this being exploited on Intel Macs."

replies(3): >>42190680 #>>42190962 #>>42191576 #
18. fn-mote ◴[] No.42190490{5}[source]
What software are you talking about?

Who is forcing you to upgrade?

For that matter, what hardware?

I run an old Intel Mac and it’s perfectly reasonable for casual work. I’m not paying for stuff like Adobe leases though.

replies(1): >>42192751 #
19. wtallis ◴[] No.42190513{5}[source]
https://support.apple.com/en-us/102772 outlines "vintage" and "obsolete" status for hardware products, with a few exceptions. I'm not aware of a similarly straightforward criteria or comprehensive list for software support periods.
replies(3): >>42190577 #>>42190671 #>>42191439 #
20. phony-account ◴[] No.42190514{5}[source]
> Macbook Airs that are only 3-5 years old

MacBook Airs from 2020 support Sequoia - so just the very upper limit of your range is relevant.

replies(1): >>42191696 #
21. 486sx33 ◴[] No.42190542{3}[source]
Rosetta2 runs an x86 exploit? Doesn’t explain iOS but still sounds interesting!
replies(1): >>42191707 #
22. wannacboatmovie ◴[] No.42190577{6}[source]
The issue with passing off a list of vintage products as some kind of past tense support schedule is by definition products become vintage when they are added to the list at some arbitrary date.

My expectation is a table of OS versions and EOL dates published in advance. Like nearly every other responsible OS vendor in existence. Apple continuing to get a pass on this in 2024 is abhorrent.

replies(1): >>42190627 #
23. wtallis ◴[] No.42190627{7}[source]
> The issue with passing off a list of vintage products as some kind of past tense support schedule is by definition products become vintage when they are added to the list at some arbitrary date.

If you read some of the text above the product list, you'll see that Apple does publish guidelines about when products can be expected to be added to the list:

> Products are considered vintage when Apple stopped distributing them for sale more than 5 and less than 7 years ago.

> Products are considered obsolete when Apple stopped distributing them for sale more than 7 years ago. Monster-branded Beats products are considered obsolete regardless of when they were purchased.

> Apple discontinues all hardware service for obsolete products, and service providers cannot order parts for obsolete products. Mac laptops may be eligible for an extended battery-only repair period for up to 10 years from when the product was last distributed for sale, subject to parts availability.

So as you can see, it's not arbitrary or unpredictable when a product is going to show up on the vintage product list. The only unpredictable or obscure part of this process is finding out how long an outdated product was still being sold after its successor launched.

replies(1): >>42190933 #
24. brian_cunnie ◴[] No.42190652{4}[source]
Agreed. It takes more than a few developers to support older operating systems.

At my old job we supported only two versions of our software product, Tanzu Operations Manager versions 2.10.x and 3.0.y), and we cut new patch releases every few weeks (similar to Apple's cadence). Bumping dependencies was a pain. Well, usually it went fine, but sometimes you'd hit a gnarly incompatibility and you'd either pin a Ruby package to a known version or try to modify the code just enough to make it work without making a major change.

If I had to put a number to it, I'd say it cost us 2 developers to keep our older product line consistently patched, and our product was a modest Ruby app, much less complicated than an entire OS.

replies(1): >>42191831 #
25. philistine ◴[] No.42190671{6}[source]
That list relates strictly to hardware repairs. Vintage macs have often been fully supported software-wise.
replies(1): >>42190715 #
26. duxup ◴[] No.42190680[source]
Or they’re just not able to confirm it everywhere but feel the code change is necessary regardless?

I’ve certainly addressed a potential issue with code that I thought might have occurred even when I couldn’t confirm it with 100% certainty.

A detailed analysis / testing and confirmation that provides certainty may take longer than addressing code.

27. wtallis ◴[] No.42190715{7}[source]
Yes, I'm fully aware that the support article I linked to is specifically about hardware support—that's why I mentioned that there isn't a similar list for software support.
28. saagarjha ◴[] No.42190733[source]
This just means the bug is in WebKit and they shipped the fix to every platform.
29. initplus ◴[] No.42190776[source]
Will be an underlying safety issue in some system library, but they have only seen "in the wild" exploits targeting Intel. "Defence in depth" - better to push the bugfix to all than to scrutinize ARM security features to understand if an exploit is possible there as well.
30. SoftTalker ◴[] No.42190850[source]
Sometimes problems manifest differently on different architectures. It's one of the advantages of building for more than just one: it shakes out bugs. Doesn't mean you don't fix the root issue in all builds.

Apple for the most part has one codebase that they build for their different architectures. They've been doing this since the NeXT days when they supported Motorola, Intel, Sparc, and maybe a couple of other architectures.

31. wannacboatmovie ◴[] No.42190933{8}[source]
Ok, but this is an Apples vs oranges comparison. (Carlos!)

We are talking about software support here.

The vintage products list is specifically targeting hardware support; e.g. how long Apple will keep spare parts in stock. After a set number of years they purge stock and you are SOL going to Chinese third party vendors and places like iFixit for batteries etc.

replies(1): >>42192741 #
32. brookst ◴[] No.42190962[source]
If you read it with enough cynicism, it doesn’t rule out Apple having actual knowledge that it was exploited to steal every last bit of information from every Mac, iPhone, iPad, iPod, Apple TV, and Apple II ever produced.
33. danieldk ◴[] No.42191439{6}[source]
Samsung nowadays tells you ahead of time how long a phone will get major updates and security updates. I think it's the same with Google Pixel. And they have a list of models and their release schedules:

https://security.samsungmobile.com/workScope.smsb

My qualm with them is though that not all devices are updated at the same time (like iOS/iPadOS/macOS). One phone may get an update the 10th of the month, while another only gets it the 30th. As a result, there is often quite a large window where vulnerabilities are known, but not yet patched (it's even worse with the cheap models that only get quarterly updates).

34. pjmlp ◴[] No.42191523{4}[source]
Which is why having cybersecurity laws and liability in computing is so relevant.
35. kafrofrite ◴[] No.42191576[source]
Most probably what Apple means is that since their codebase is shared, the vulnerability exists across devices. This does not mean that the vulnerability is actively exploited in iOS nor that it will not be actively exploited as part of some other campaign.
36. wannacboatmovie ◴[] No.42191696{6}[source]
Absolutely not. Apple was still selling non-Retina Intel MacBook Airs until 2019. Those are now completely unsupported with no security updates having topped out at Monterrey. 5 years of updates on a new laptop is borderline criminal.
37. ◴[] No.42191707{4}[source]
38. justinclift ◴[] No.42191831{5}[source]
> new patch releases every few weeks (similar to Apple's cadence)

Is Apply really releasing new patched OS updates every few weeks?

39. vetinari ◴[] No.42192741{9}[source]
Not really; vintage macs turning obsolete are being dropped from the macOS support very reliably. I.e. the 2015 mbp was dropped from 2022 macos release like on the clock.
40. vetinari ◴[] No.42192751{6}[source]
What exactly is an old Intel mac and what is a casual work?

For example, I have 2015 macbook pro. The last macos release for it is Monterey. Even brew has problems with that, erroring out when installing packages like libpng and complaining, that I should upgrade xcode cli tools. Which I can't.

41. chris_wot ◴[] No.42200877{5}[source]
I see the Mac fanboys aren't happy with my factual statement. I love Macs (won't use anything else) but I also live in reality.