![]() Impact: Processing a maliciously crafted image may lead to a denial of serviceĬVE-2021-1773: Xingwei Lin of Ant Security Light-Year Labĭescription: An out-of-bounds read issue existed in the curl. Impact: A remote attacker may be able to leak memoryĬVE-2020-29608: Xingwei Lin of Ant Security Light-Year LabĪvailable for: macOS Big Sur 11.0.1 and macOS Catalina 10.15.7ĭescription: An access issue was addressed with improved memory management.ĬVE-2021-1783: Xingwei Lin of Ant Security Light-Year LabĬVE-2021-1741: Xingwei Lin of Ant Security Light-Year LabĬVE-2021-1743: Mickey Jin & Junzhi Lu of Trend Micro working with Trend Micro’s Zero Day Initiative, Xingwei Lin of Ant Security Light-Year Lab Impact: Processing a maliciously crafted font may lead to arbitrary code executionĬVE-2021-1790: Peter Nguyen Vu Hoang of STAR Labsĭescription: This issue was addressed by removing the vulnerable code.ĬVE-2021-1775: Mickey Jin and Qi Sun of Trend Micro working with Trend Micro’s Zero Day Initiative This was addressed with improved input validation.ĬVE-2021-1791: Junzhi Lu Qi Sun & Mickey Jin of Trend Micro working with Trend Micro’s Zero Day Initiative Impact: A malicious application may be able to disclose kernel memoryĭescription: An out-of-bounds read issue existed that led to the disclosure of kernel memory. Impact: A malicious application may be able to access private informationĬVE-2020-27937: Wojciech Reguła of SecuRingĬVE-2021-1802: Zhongcheng Li of WPS Security Response Center Impact: A local user may be able to create or modify system filesĭescription: A logic issue was addressed with improved state management.ĬVE-2021-1786: Csaba Fitzl of Offensive Security ![]() Impact: A local attacker may be able to elevate their privilegesĭescription: Multiple issues were addressed with improved logic. Impact: A remote attacker may be able to cause arbitrary code executionĭescription: An out-of-bounds read was addressed with improved bounds checking.ĬVE-2021-1792: Mickey Jin & Junzhi Lu of Trend Micro working with Trend Micro’s Zero Day Initiative Impact: Processing a maliciously crafted text file may lead to arbitrary code executionĭescription: A stack overflow was addressed with improved input validation.ĬVE-2021-1772: Mickey Jin of Trend Micro working with Trend Micro’s Zero Day Initiative Impact: Processing a maliciously crafted image may lead to arbitrary code executionĭescription: An out-of-bounds read was addressed with improved input validation.ĬVE-2021-1759: Hou JingYi of Qihoo 360 CERT Impact: Processing a maliciously crafted font file may lead to arbitrary code executionĭescription: An out-of-bounds write issue was addressed with improved bounds checking.ĬVE-2021-1776: Ivan Fratric of Google Project Zero Impact: Processing maliciously crafted web content may lead to code executionĭescription: An out-of-bounds write was addressed with improved input validation.ĬVE-2021-1747: JunDong Xie of Ant Security Light-Year LabĪvailable for: macOS Mojave 10.14.6, macOS Catalina 10.15.7, macOS Big Sur 11.0.1 Impact: A malicious application could execute arbitrary code leading to compromise of user informationĭescription: A memory corruption issue was addressed with improved state management. Impact: Processing maliciously crafted web content may lead to arbitrary code executionĭescription: An integer overflow was addressed with improved input validation.ĬVE-2020-27945: Zhuo Liang of Qihoo 360 Vulcan Team Impact: A local user may be able to read arbitrary filesĭescription: The issue was addressed with improved permissions logic.Īvailable for: macOS Catalina 10.15.7 and macOS Mojave 10.14.6 Impact: A remote attacker may be able to cause a denial of serviceĭescription: This issue was addressed with improved checks. ![]() 20:16:07-05 elma Installer: Failed to adopt update: Unable to verify software update.Available for: macOS Big Sur 11.0.1, macOS Catalina 10.15.7, and macOS Mojave 10.14.6 20:16:07-05 elma Installer: ManualAdoption: stashToken is Nil, softwareupdated did not authorize a token, stashing has failed! 22:25:35-04 elma3 softwareupdated: SUBridgeOSUpdateManager: bridgeOS update prepare for 061-06469 failed: Error Domain=BOSErrorDomain Code=204 "An error occurred during preflight." UserInfo= 22:25:35-04 elma3 softwareupdated: SUBridgeOSUpdateManager: bridgeOS update prepare complete for 061-06469 Preparing macOS Mojave 10.14.6 Supplemental UpdateĮrror downloading macOS Mojave 10.14.6 Supplemental Update: An error occurred installing the update. Sudo softwareupdate -dump-state -i -a -Rĭownloading macOS Mojave 10.14.6 Supplemental Updateĭownloaded macOS Mojave 10.14.6 Supplemental Update I deleted /Library/Updates/_ManualUpdate/macOS*
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |