[mmr] Fwd: APPLE-SA-2020-06-01-2 macOS Catalina 10.15.5 Supplemental Update, Security Update 2020-003 High Sierra

  • From: "Julian Koh" <dmarc-noreply@xxxxxxxxxxxxx> (Redacted sender "kohster" for DMARC)
  • To: mmr@xxxxxxxxxxxxx
  • Date: Mon, 1 Jun 2020 13:50:56 -0500

OK, I know that the unc0ver thing has been getting press primarily as a 
jailbreaking mechanism, but it really struck me that a kernel fix for it got 
rolled out to iOS, iPadOS, tvOS, and watchOS, but when it came to macOS, it 
only gets released for Catalina an High Sierra?  I didn’t see this CVE in the 
previous security update for Mojave.  I find it hard to believe that Mojave is 
immune out of all of these other OS’es….

-Julian

Begin forwarded message:

From: Apple Product Security via Security-announce 
<security-announce@xxxxxxxxxxxxxxx>
Subject: APPLE-SA-2020-06-01-2 macOS Catalina 10.15.5 Supplemental Update, 
Security Update 2020-003 High Sierra
Date: June 1, 2020 at 12:58:45 CDT
To: security-announce@xxxxxxxxxxxxxxx
Reply-To: Apple Product Security <product-security-noreply@xxxxxxxxxxxxxxx>

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

APPLE-SA-2020-06-01-2 macOS Catalina 10.15.5 Supplemental Update,
Security Update 2020-003 High Sierra

macOS Catalina 10.15.5 Supplemental Update, Security Update 2020-003
High Sierra are now available and address the following:

Kernel
Available for: macOS High Sierra 10.13.6, macOS Catalina 10.15.5
Impact: An application may be able to execute arbitrary code with
kernel privileges
Description: A memory consumption issue was addressed with improved
memory handling.
CVE-2020-9859: unc0ver

Installation note:

macOS Catalina 10.15.5 Supplemental Update, Security Update 2020-003
High Sierra may be obtained from the Mac App Store or
Apple's Software Downloads web site:
https://support.apple.com/downloads/
-----BEGIN PGP SIGNATURE-----
Version: BCPG v1.64
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=594r
-----END PGP SIGNATURE-----
_______________________________________________
Do not post admin requests to the list. They will be ignored.
Security-announce mailing list      (Security-announce@xxxxxxxxxxxxxxx)
Help/Unsubscribe/Update your Subscription:
https://lists.apple.com/mailman/options/security-announce/kohster%40mac.com

This email sent to kohster@xxxxxxx


--  
Julian Y. Koh
kohster@xxxxxxx





Other related posts:

  • » [mmr] Fwd: APPLE-SA-2020-06-01-2 macOS Catalina 10.15.5 Supplemental Update, Security Update 2020-003 High Sierra - Julian Koh