![]() Apple assumes no responsibility with regard to the selection, performance, or use of third-party websites or products. Information about products not manufactured by Apple, or independent websites not controlled or tested by Apple, is provided without recommendation or endorsement. Apple is aware of reports that an exploit for this issue exists in the wild.ĭescription: A memory initialization issue was addressed. Impact: A malicious application may be able to disclose kernel memory. Apple is aware of reports that an exploit for this issue exists in the wild.ĭescription: A type confusion issue was addressed with improved state handling. Impact: A malicious application may be able to execute arbitrary code with kernel privileges. Apple is aware of reports that an exploit for this issue exists in the wild.ĭescription: A memory corruption issue was addressed with improved input validation. Impact: Processing a maliciously crafted font may lead to arbitrary code execution. Security Update 2020-006 High Sierra, Security Update 2020-006 MojaveĪvailable for: macOS High Sierra 10.13.6, macOS Mojave 10.14.6 Recent releases are listed on the Apple security updates page.Īpple security documents reference vulnerabilities by CVE-ID when possible.įor more information about security, see the Apple Product Security page. About Apple security updatesįor our customers’ protection, Apple doesn’t disclose, discuss, or confirm security issues until an investigation has occurred and patches or releases are available. This document describes the security content of Security Update 2020-006 High Sierra, Security Update 2020-006 Mojave. About the security content of Security Update 2020-006 High Sierra, Security Update 2020-006 Mojave
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |