According to Apple, the additional update for macOS Catalina 10.15.7 includes the following fixes:
FontParser
- Available for: macOS Catalina 10.15.7
- Impact: Processing a maliciously crafted font could result in arbitrary code execution. Apple is aware of reports that an exploit for this problem exists in the wild.
- Description: A memory corruption issue was addressed with improved input validation.
- CVE-2020-27930: Google Project Zero
Kernel
- Available for: macOS Catalina 10.15.7
- Impact: A malicious application could potentially run arbitrary code with kernel privileges. Apple is aware of reports that an exploit for this problem exists in the wild.
- Description: A type confusion issue was addressed with improved status handling.
- CVE-2020-27932: Google Project Zero
Kernel
- Available for: macOS Catalina 10.15.7
- Impact: A malicious application could potentially expose the kernel memory. Apple is aware of reports that an exploit for this problem exists in the wild.
- Description: An issue with memory initialization was resolved.
- CVE-2020-27950: Google Project Zero
If you’re running macOS Catalina 10.15.7, today’s supplemental update can be found in the System Preferences app on your Mac.
FTC: We Use Income Earning Auto Affiliate Links. More.
For more Apple news, check out 9to5Mac on YouTube:
These were the details of the news Apple released the additional update for macOS Catalina 10.15.7 with security... for this day. We hope that we have succeeded by giving you the full details and information. To follow all our news, you can subscribe to the alerts system or to one of our different systems to provide you with all that is new.
It is also worth noting that the original news has been published and is available at de24.news and the editorial team at AlKhaleej Today has confirmed it and it has been modified, and it may have been completely transferred or quoted from it and you can read and follow this news from its main source.