[<prev] [next>] [day] [month] [year] [list]
Message-id: <B24F4468-0E81-4520-8DD8-46571F4ADB68@lists.apple.com>
Date: Thu, 24 Sep 2020 16:13:29 -0700
From: Apple Product Security via Fulldisclosure <fulldisclosure@...lists.org>
To: security-announce@...ts.apple.com
Subject: [FD] APPLE-SA-2020-09-24-1 macOS Catalina 10.15.6 Supplemental
Update, Security Update 2020-005 High Sierra,
Security Update 2020-005 Mojave
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
APPLE-SA-2020-09-24-1 macOS Catalina 10.15.6 Supplemental Update,
Security Update 2020-005 High Sierra, Security Update 2020-005 Mojave
macOS Catalina 10.15.6 Supplemental Update, Security Update 2020-005
High Sierra, Security Update 2020-005 Mojave are now available and
address the following:
ImageIO
Available for: macOS High Sierra 10.13.6, macOS Mojave 10.14.6
Impact: Processing a maliciously crafted image may lead to arbitrary
code execution
Description: An out-of-bounds read was addressed with improved input
validation.
CVE-2020-9961: Xingwei Lin of Ant Group Light-Year Security Lab
Mail
Available for: macOS High Sierra 10.13.6
Impact: A remote attacker may be able to unexpectedly alter
application state
Description: This issue was addressed with improved checks.
CVE-2020-9941: Fabian Ising of FH Münster University of Applied
Sciences and Damian Poddebniak of FH Münster University of Applied
Sciences
Model I/O
Available for: macOS High Sierra 10.13.6, macOS Mojave 10.14.6, macOS
Catalina 10.15
Impact: Processing a maliciously crafted USD file may lead to
unexpected application termination or arbitrary code execution
Description: An out-of-bounds read was addressed with improved bounds
checking.
CVE-2020-9973: Aleksandar Nikolic of Cisco Talos
Sandbox
Available for: macOS High Sierra 10.13.6, macOS Mojave 10.14.6, macOS
Catalina 10.15
Impact: A malicious application may be able to access restricted
files
Description: A logic issue was addressed with improved restrictions.
CVE-2020-9968: Adam Chester(@xpn) of TrustedSec
Additional recognition
Bluetooth
We would like to acknowledge Andy Davis of NCC Group for their
assistance.
Installation note:
macOS Catalina 10.15.6 Supplemental Update, Security Update 2020-005
High Sierra, Security Update 2020-005 Mojave may be obtained from the
Mac App Store or
Apple's Software Downloads web site:
https://support.apple.com/downloads/
-----BEGIN PGP SIGNATURE-----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=/4hQ
-----END PGP SIGNATURE-----
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists