For the protection of our customers, Apple does not disclose, discuss, or confirm security issues until a full investigation has occurred and any necessary patches or releases are available. To learn more about Apple Product Security, see the Apple Product Security website.
For information about the Apple Product Security PGP Key, see How to use the Apple Product Security PGP Key.
Where possible, CVE IDs are used to reference the vulnerabilities for further information.
To learn about other Security Updates, see Apple Security Updates.
Aug 13, 2018 Mac OS X 10.10 Yosemite is the Eleventh major release of the Mac OS X. It was released on October 16, 2014. Yosemite is the free update through the Mac App Store worldwide. It has some major changes with the user interface, which replaced the skeuomorphism with the flat graphic design and the blurred translucency effects, which was introduced. Get the best deals on F-Secure Computer Software and find everything you'll need to improve your home office setup at eBay.com. Fast & Free shipping on many items! Apple Mac OS X 10.10, Yosemite. F-Secure Filter Applied. Currently F-Secure Anti-Virus for Mac does not support Mac OS X Yosemite yet as Apple has not officially launch it. F-Secure will support Mac OS X Yosemite after Apple launches the official version. Best Regards, Andy Yoon.
OS X Yosemite v10.10.2 and Security Update 2015-001
- AFP ServerAvailable for: OS X Mavericks v10.9.5Impact: A remote attacker may be able to determine all the network addresses of the systemDescription: The AFP file server supported a command which returned all the network addresses of the system. This issue was addressed by removing the addresses from the result.CVE-IDCVE-2014-4426 : Craig Young of Tripwire VERT
- bashAvailable for: OS X Yosemite v10.10 and v10.10.1Impact: Multiple vulnerabilities in bash, including one that may allow local attackers to execute arbitrary codeDescription: Multiple vulnerabilities existed in bash. These issues were addressed by updating bash to patch level 57.CVE-IDCVE-2014-6277CVE-2014-7186CVE-2014-7187
- BluetoothAvailable for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5Impact: A malicious application may be able to execute arbitrary code with system privilegesDescription: An integer signedness error existed in IOBluetoothFamily which allowed manipulation of kernel memory. This issue was addressed through improved bounds checking. This issue does not affect OS X Yosemite systems.CVE-IDCVE-2014-4497
- BluetoothAvailable for: OS X Yosemite v10.10 and v10.10.1Impact: A malicious application may be able to execute arbitrary code with system privilegesDescription: An error existed in the Bluetooth driver that allowed a malicious application to control the size of a write to kernel memory. The issue was addressed through additional input validation.CVE-IDCVE-2014-8836 : Ian Beer of Google Project Zero
- BluetoothAvailable for: OS X Yosemite v10.10 and v10.10.1Impact: A malicious application may be able to execute arbitrary code with system privilegesDescription: Multiple security issues existed in the Bluetooth driver, allowing a malicious application to execute arbitrary code with system privilege. The issues were addressed through additional input validation.CVE-IDCVE-2014-8837 : Roberto Paleari and Aristide Fattori of Emaze Networks
- CFNetwork CacheAvailable for: OS X Yosemite v10.10 and v10.10.1Impact: Website cache may not be fully cleared after leaving private browsingDescription: A privacy issue existed where browsing data could remain in the cache after leaving private browsing. This issue was addressed through a change in caching behavior.CVE-IDCVE-2014-4460
- CoreGraphicsAvailable for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1Impact: Opening a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code executionDescription: An integer overflow existed in the handling of PDF files. This issue was addressed through improved bounds checking.CVE-IDCVE-2014-4481 : Felipe Andres Manzano of the Binamuse VRT, via the iSIGHT Partners GVP Program
- CPU SoftwareAvailable for: OS X Yosemite v10.10 and v10.10.1, for: MacBook Pro Retina, MacBook Air (Mid 2013 and later), iMac (Late 2013 and later), Mac Pro (Late 2013)Impact: A malicious Thunderbolt device may be able to affect firmware flashingDescription: Thunderbolt devices could modify the host firmware if connected during an EFI update. This issue was addressed by not loading option ROMs during updates.CVE-IDCVE-2014-4498 : Trammell Hudson of Two Sigma Investments
- CommerceKit FrameworkAvailable for: OS X Yosemite v10.10 and v10.10.1Impact: An attacker with access to a system may be able to recover Apple ID credentialsDescription: An issue existed in the handling of App Store logs. The App Store process could log Apple ID credentials in the log when additional logging was enabled. Mac os mojave. This issue was addressed by disallowing logging of credentials.CVE-IDCVE-2014-4499 : Sten Petersen
- CoreGraphicsAvailable for: OS X Yosemite v10.10 and v10.10.1Impact: Some third-party applications with non-secure text entry and mouse events may log those eventsDescription: Due to the combination of an uninitialized variable and an application's custom allocator, non-secure text entry and mouse events may have been logged. This issue was addressed by ensuring that logging is off by default. This issue did not affect systems prior to OS X Yosemite.CVE-IDCVE-2014-1595 : Steven Michaud of Mozilla working with Kent Howard
- CoreGraphicsAvailable for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5Impact: Opening a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code executionDescription: A memory corruption issue existed in the handling of PDF files. The issue was addressed through improved bounds checking. This issue does not affect OS X Yosemite systems.CVE-IDCVE-2014-8816 : Mike Myers, of Digital Operatives LLC
- CoreSymbolicationAvailable for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1Impact: A malicious application may be able to execute arbitrary code with system privilegesDescription: Multiple type confusion issues existed in coresymbolicationd's handling of XPC messages. These issues were addressed through improved type checking.CVE-IDCVE-2014-8817 : Ian Beer of Google Project Zero
- FontParserAvailable for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1Impact: Processing a maliciously crafted .dfont file may lead to an unexpected application termination or arbitrary code executionDescription: A memory corruption issue existed in the handling of .dfont files. This issue was addressed through improved bounds checking.CVE-IDhttps://courtpotent318.weebly.com/google-chrome-support-for-macos-1011.html. CVE-2014-4484 : Gaurav Baruah working with HP's Zero Day Initiative
- FontParserAvailable for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1Impact: Opening a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code executionDescription: A buffer overflow existed in the handling of font files. This issue was addressed through improved bounds checking.CVE-2014-4483 : Apple
- FoundationAvailable for: OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1Impact: Viewing a maliciously crafted XML file may lead to an unexpected application termination or arbitrary code executionDescription: A buffer overflow existed in the XML parser. This issue was addressed through improved bounds checking.CVE-IDCVE-2014-4485 : Apple
- Intel Graphics DriverAvailable for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1Impact: Multiple vulnerabilities in Intel graphics driverDescription: Multiple vulnerabilities existed in the Intel graphics driver, the most serious of which may have led to arbitrary code execution with system privileges. This update addresses the issues through additional bounds checks.CVE-IDCVE-2014-8819 : Ian Beer of Google Project ZeroCVE-2014-8820 : Ian Beer of Google Project ZeroCVE-2014-8821 : Ian Beer of Google Project Zero
- IOAcceleratorFamilyAvailable for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1Impact: A malicious application may be able to execute arbitrary code with system privilegesDescription: A null pointer dereference existed in IOAcceleratorFamily's handling of certain IOService userclient types. This issue was addressed through improved validation of IOAcceleratorFamily contexts.CVE-IDCVE-2014-4486 : Ian Beer of Google Project Zero
- IOHIDFamilyAvailable for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1Impact: A malicious application may be able to execute arbitrary code with system privilegesDescription: A buffer overflow existed in IOHIDFamily. This issue was addressed with improved bounds checking.CVE-IDCVE-2014-4487 : TaiG Jailbreak Team
- IOHIDFamilyAvailable for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1Impact: A malicious application may be able to execute arbitrary code with system privilegesDescription: A validation issue existed in IOHIDFamily's handling of resource queue metadata. This issue was addressed through improved validation of metadata.CVE-IDCVE-2014-4488 : Apple
- IOHIDFamilyAvailable for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1Impact: A malicious application may be able to execute arbitrary code with system privilegesDescription: A null pointer dereference existed in IOHIDFamily's handling of event queues. This issue was addressed through improved validation of IOHIDFamily event queue initialization.CVE-IDCVE-2014-4489 : @beist
- IOHIDFamilyAvailable for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1Impact: Executing a malicious application may result in arbitrary code execution within the kernelDescription: A bounds checking issue existed in a user client vended by the IOHIDFamily driver which allowed a malicious application to overwrite arbitrary portions of the kernel address space. The issue is addressed by removing the vulnerable user client method.CVE-IDCVE-2014-8822 : Vitaliy Toropov working with HP's Zero Day Initiative
- IOKitAvailable for: OS X Yosemite v10.10 and v10.10.1Impact: A malicious application may be able to execute arbitrary code with system privilegesDescription: An integer overflow existed in the handling of IOKit functions. This issue was addressed through improved validation of IOKit API arguments.CVE-IDCVE-2014-4389 : Ian Beer of Google Project Zero
- IOUSBFamilyAvailable for: OS X Yosemite v10.10 and v10.10.1Impact: A privileged application may be able to read arbitrary data from kernel memoryDescription: A memory access issue existed in the handling of IOUSB controller user client functions. This issue was addressed through improved argument validation.CVE-IDCVE-2014-8823 : Ian Beer of Google Project Zero
- KerberosAvailable for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1Impact: A malicious application may be able to execute arbitrary code with system privilegesDescription: The Kerberos libgssapi library returned a context token with a dangling pointer. This issue was addressed by improving state management.CVE-IDCVE-2014-5352
- Kernel Mac os x download el capitan dmg.Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1Impact: A malicious application may be able to execute arbitrary code with system privilegesDescription: Specifying a custom cache mode allowed writing to kernel read-only shared memory segments. This issue was addressed by not granting write permissions as a side-effect of some custom cache modes.CVE-IDCVE-2014-4495 : Ian Beer of Google Project Zero
- KernelAvailable for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1Impact: A malicious application may be able to execute arbitrary code with system privilegesDescription: A validation issue existed in the handling of certain metadata fields of IODataQueue objects. This issue was addressed through improved validation of metadata.CVE-IDCVE-2014-8824 : @PanguTeam
- KernelAvailable for: OS X Yosemite v10.10 and v10.10.1Impact: A local attacker can spoof directory service responses to the kernel, elevate privileges, or gain kernel executionDescription: Issues existed in identitysvc validation of the directory service resolving process, flag handling, and error handling. This issue was addressed through improved validation.CVE-IDCVE-2014-8825 : Alex Radocea of CrowdStrike
- KernelAvailable for: OS X Yosemite v10.10 and v10.10.1Impact: A local user may be able to determine kernel memory layoutDescription: Multiple uninitialized memory issues existed in the network statistics interface, which led to the disclosure of kernel memory content. This issue was addressed through additional memory initialization.CVE-IDCVE-2014-4371 : Fermin J. Serna of the Google Security TeamCVE-2014-4419 : Fermin J. Serna of the Google Security TeamCVE-2014-4420 : Fermin J. Serna of the Google Security TeamCVE-2014-4421 : Fermin J. Serna of the Google Security Team
- KernelAvailable for: OS X Mavericks v10.9.5Impact: A person with a privileged network position may cause a denial of serviceDescription: A race condition issue existed in the handling of IPv6 packets. This issue was addressed through improved lock state checking.CVE-IDCVE-2011-2391
- KernelAvailable for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1Impact: Maliciously crafted or compromised applications may be able to determine addresses in the kernelDescription: An information disclosure issue existed in the handling of APIs related to kernel extensions. Responses containing an OSBundleMachOHeaders key may have included kernel addresses, which may aid in bypassing address space layout randomization protection. This issue was addressed by unsliding the addresses before returning them.CVE-IDCVE-2014-4491 : @PanguTeam, Stefan Esser
- KernelAvailable for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1Impact: A malicious application may be able to execute arbitrary code with system privilegesDescription: A validation issue existed in the handling of certain metadata fields of IOSharedDataQueue objects. This issue was addressed through relocation of the metadata.CVE-IDCVE-2014-4461 : @PanguTeam
- LaunchServicesAvailable for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1Impact: A malicious JAR file may bypass Gatekeeper checksDescription: An issue existed in the handling of application launches which allowed certain malicious JAR files to bypass Gatekeeper checks. This issue was addressed through improved handling of file type metadata.CVE-IDCVE-2014-8826 : Hernan Ochoa of Amplia Security
- libnetcoreAvailable for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1Impact: A malicious, sandboxed app can compromise the networkd daemonDescription: Multiple type confusion issues existed in networkd's handling of interprocess communication. By sending networkd a maliciously formatted message, it may have been possible to execute arbitrary code as the networkd process. The issue is addressed through additional type checking.CVE-IDCVE-2014-4492 : Ian Beer of Google Project Zero
- LoginWindowAvailable for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1Impact: A Mac may not lock immediately upon wakeDescription: An issue existed in the rendering of the lock screen. This issue was address through improved screen rendering while locked.CVE-IDCVE-2014-8827 : Xavier Bertels of Mono, and multiple OS X seed testers
![Yosemite Yosemite](/uploads/1/2/6/5/126561752/846880308.png)
- lukemftpAvailable for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1Impact: Using the command line ftp tool to fetch files from a malicious http server may lead to arbitrary code executionDescription: A command injection issue existed in the handling of HTTP redirects. This issue was addressed through improved validation of special characters.CVE-IDCVE-2014-8517
- ntpdAvailable for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1Impact: Using the ntp daemon with cryptographic authentication enabled may lead to information leaksDescription: Multiple input validation issues existed in ntpd. These issues were addressed through improved data validation.CVE-IDCVE-2014-9297
- OpenSSLAvailable for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1Impact: Multiple vulnerabilities in OpenSSL 0.9.8za, including one that may allow an attacker to downgrade connections to use weaker cipher-suites in applications using the libraryDescription: Multiple vulnerabilities existed in OpenSSL 0.9.8za. These issues were addressed by updating OpenSSL to version 0.9.8zc.CVE-IDCVE-2014-3566CVE-2014-3567CVE-2014-3568
- SandboxAvailable for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5Impact: A sandboxed process may be able to circumvent sandbox restrictionsDescription: A design issue existed in the caching of sandbox profiles which allowed sandboxed applications to gain write access to the cache. This issue was addressed by restricting write access to paths containing a “com.apple.sandbox” segment. This issue does not affect OS X Yosemite v10.10 or later.CVE-IDCVE-2014-8828 : Apple
- SceneKitAvailable for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5 https://onthegorenew637.weebly.com/open-spotlight-on-mac.html.Impact: A malicious application could execute arbitrary code leading to compromise of user informationDescription: Multiple out of bounds write issues existed in SceneKit. These issues were addressed through improved bounds checking.CVE-IDCVE-2014-8829 : Jose Duart of the Google Security Team
- SceneKitAvailable for: OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1Impact: Viewing a maliciously crafted Collada file may lead to an unexpected application termination or arbitrary code executionDescription: A heap buffer overflow existed in SceneKit’s handling of Collada files. Viewing a maliciously crafted Collada file may have led to an unexpected application termination or arbitrary code execution. This issue was addressed through improved validation of accessor elements.CVE-IDCVE-2014-8830 : Jose Duart of Google Security Team
F Secure For Mac Yosemite 2017
- SecurityAvailable for: OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1Impact: A downloaded application signed with a revoked Developer ID certificate may pass Gatekeeper checksDescription: An issue existed with how cached application certificate information was evaluated. This issue was addressed with cache logic improvements.CVE-IDCVE-2014-8838 : Apple
- security_taskgateAvailable for: OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1Impact: An app may access keychain items belonging to other appsDescription: An access control issue existed in the Keychain. Applications signed with self-signed or Developer ID certificates could access keychain items whose access control lists were based on keychain groups. This issue was addressed by validating the signing identity when granting access to keychain groups.CVE-IDCVE-2014-8831 : Apple
F Secure For Mac Yosemite Update
- SpotlightAvailable for: OS X Yosemite v10.10 and v10.10.1Impact: The sender of an email could determine the IP address of the recipientDescription: Spotlight did not check the status of Mail’s 'Load remote content in messages' setting. This issue was addressed by improving configuration checking.CVE-IDCVE-2014-8839 : John Whitehead of The New York Times, Frode Moe of LastFriday.no
- SpotlightAvailable for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1Impact: Spotlight may save unexpected information to an external hard driveDescription: An issue existed in Spotlight where memory contents may have been written to external hard drives when indexing. This issue was addressed with better memory management.CVE-IDCVE-2014-8832 : F-Secure
- SpotlightIndexAvailable for: OS X Yosemite v10.10 and v10.10.1Impact: Spotlight may display results for files not belonging to the userDescription: A deserialization issue existed in Spotlight's handling of permission caches. A user performing a Spotlight query may have been shown search results referencing files for which they don't have sufficient privileges to read. This issue was addressed with improved bounds checking.CVE-IDCVE-2014-8833 : David J Peacock, Independent Technology Consultant
- sysmondAvailable for: OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1Impact: A malicious application may be able to execute arbitrary code with root privilegesDescription: A type confusion vulnerability existed in sysmond that allowed a local application to escalate privileges. The issue was addressed with improved type checking.CVE-2014-8835 : Ian Beer of Google Project Zero
- UserAccountUpdaterAvailable for: OS X Yosemite v10.10 and v10.10.1Impact: Printing-related preference files may contain sensitive information about PDF documentsDescription: OS X Yosemite v10.10 addressed an issue in the handling of password-protected PDF files created from the Print dialog where passwords may have been included in printing preference files. This update removes such extraneous information that may have been present in printing preference files.CVE-IDCVE-2014-8834 : Apple
Note: OS X Yosemite 10.10.2 includes the security content of Safari 8.0.3.
OS X 10.10 Yosemite was shown off at WWDC 2014 on June 2 and will be released sometime in the fall. In addition to new features like Today view and Extensibility widgets in Notification Center, a better, smarter Spotlight, iCloud Drive, enhanced functionality in Mail, Messages, and Safari, and Continuity with iOS 8, OS X Yosemite brings interface and experience refinements to Apple's desktop operating system, similar in spirit if not exact execution to the iOS 7 makeover of 2013 — interface depth and translucency effects, textual clarity and other elements to improve the overall user experience.
Get Yosemite For Mac
We'll be adding new articles every day or so, so make sure to come back often and share this link with your family and friends. We happily explain so you don't have to!