lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-id: <94492E89-1CEF-4E27-A49F-B66F09F58524@lists.apple.com>
Date: Mon, 01 Jun 2020 10:58:45 -0700
From: Apple Product Security via Fulldisclosure <fulldisclosure@...lists.org>
To: security-announce@...ts.apple.com
Subject: [FD] APPLE-SA-2020-06-01-2 macOS Catalina 10.15.5 Supplemental
 Update, Security Update 2020-003 High Sierra

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

APPLE-SA-2020-06-01-2 macOS Catalina 10.15.5 Supplemental Update,
Security Update 2020-003 High Sierra

macOS Catalina 10.15.5 Supplemental Update, Security Update 2020-003
High Sierra are now available and address the following:

Kernel
Available for: macOS High Sierra 10.13.6, macOS Catalina 10.15.5
Impact: An application may be able to execute arbitrary code with
kernel privileges
Description: A memory consumption issue was addressed with improved
memory handling.
CVE-2020-9859: unc0ver

Installation note:

macOS Catalina 10.15.5 Supplemental Update, Security Update 2020-003
High Sierra may be obtained from the Mac App Store or
Apple's Software Downloads web site:
https://support.apple.com/downloads/
-----BEGIN PGP SIGNATURE-----
Version: BCPG v1.64
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=594r
-----END PGP SIGNATURE-----

_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ