[<prev] [next>] [day] [month] [year] [list]
Message-id: <449F9BA5-A5D7-4647-9336-98CE3D7BDE7F@lists.apple.com>
Date: Tue, 25 May 2021 15:22:03 -0700
From: Apple Product Security via Fulldisclosure <fulldisclosure@...lists.org>
To: security-announce@...ts.apple.com
Subject: [FD] APPLE-SA-2021-05-25-8 Boot Camp 6.1.14
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
APPLE-SA-2021-05-25-8 Boot Camp 6.1.14
Boot Camp 6.1.14* addresses the following issues.
Information about the security content is also available at
https://support.apple.com/HT212517.
Boot Camp
Available for: Mac Pro (Late 2013 and later), MacBook Pro (Late 2013
and later), MacBook Air (Mid 2013 and later), Mac mini (Mid 2014 and
later), iMac (Mid 2014 and later), MacBook (Early 2015 and later),
iMac Pro (Late 2017)
Impact: A malicious application may be able to elevate privileges
Description: A memory corruption issue was addressed with improved
state management.
CVE-2021-30675: MJ0011 of Kunlun Lab
* Boot Camp requires a Mac with an Intel processor.
Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----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=s7E9
-----END PGP SIGNATURE-----
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists