lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Thu, 24 Sep 2020 16:13:29 -0700
From: Apple Product Security via Fulldisclosure <fulldisclosure@...lists.org>
To: security-announce@...ts.apple.com
Subject: [FD] APPLE-SA-2020-09-24-1 macOS Catalina 10.15.6 Supplemental
 Update, Security Update 2020-005 High Sierra,
 Security Update 2020-005 Mojave

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

APPLE-SA-2020-09-24-1 macOS Catalina 10.15.6 Supplemental Update,
Security Update 2020-005 High Sierra, Security Update 2020-005 Mojave

macOS Catalina 10.15.6 Supplemental Update, Security Update 2020-005
High Sierra, Security Update 2020-005 Mojave are now available and
address the following:

ImageIO
Available for: macOS High Sierra 10.13.6, macOS Mojave 10.14.6
Impact: Processing a maliciously crafted image may lead to arbitrary
code execution
Description: An out-of-bounds read was addressed with improved input
validation.
CVE-2020-9961: Xingwei Lin of Ant Group Light-Year Security Lab

Mail
Available for: macOS High Sierra 10.13.6
Impact: A remote attacker may be able to unexpectedly alter
application state
Description: This issue was addressed with improved checks.
CVE-2020-9941: Fabian Ising of FH Münster University of Applied
Sciences and Damian Poddebniak of FH Münster University of Applied
Sciences

Model I/O
Available for: macOS High Sierra 10.13.6, macOS Mojave 10.14.6, macOS
Catalina 10.15
Impact: Processing a maliciously crafted USD file may lead to
unexpected application termination or arbitrary code execution
Description: An out-of-bounds read was addressed with improved bounds
checking.
CVE-2020-9973: Aleksandar Nikolic of Cisco Talos

Sandbox
Available for: macOS High Sierra 10.13.6, macOS Mojave 10.14.6, macOS
Catalina 10.15
Impact: A malicious application may be able to access restricted
files
Description: A logic issue was addressed with improved restrictions.
CVE-2020-9968: Adam Chester(@xpn) of TrustedSec

Additional recognition

Bluetooth
We would like to acknowledge Andy Davis of NCC Group for their
assistance.

Installation note:

macOS Catalina 10.15.6 Supplemental Update, Security Update 2020-005
High Sierra, Security Update 2020-005 Mojave may be obtained from the
Mac App Store or
Apple's Software Downloads web site:
https://support.apple.com/downloads/
-----BEGIN PGP SIGNATURE-----
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=/4hQ
-----END PGP SIGNATURE-----


_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Powered by blists - more mailing lists