First published: Mon Sep 13 2021(Updated: )
A race condition was addressed with additional validation. This issue is fixed in Security Update 2021-005 Catalina. Mounting a maliciously crafted NFS network share may lead to arbitrary code execution with system privileges.
Credit: product-security@apple.com Jordy Zomer Certified Secure
Affected Software | Affected Version | How to fix |
---|---|---|
Apple Mac OS X | >=10.15<=10.15.6 | |
Apple Mac OS X | =10.15.7 | |
Apple Mac OS X | =10.15.7-security_update_2020 | |
Apple Mac OS X | =10.15.7-security_update_2020-001 | |
Apple Mac OS X | =10.15.7-security_update_2020-005 | |
Apple Mac OS X | =10.15.7-security_update_2020-007 | |
Apple Mac OS X | =10.15.7-security_update_2021-001 | |
Apple Mac OS X | =10.15.7-security_update_2021-002 | |
Apple Mac OS X | =10.15.7-security_update_2021-003 | |
Apple Mac OS X | =10.15.7-supplemental_update | |
Apple Catalina |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2020-29622 is a vulnerability related to a race condition in the Kernel of Apple Catalina.
CVE-2020-29622 affects Apple Catalina by exploiting a race condition vulnerability in the Kernel.
The severity of CVE-2020-29622 is determined by the potential impact of the race condition vulnerability and should be assessed by system administrators.
To fix CVE-2020-29622, it is recommended to update Apple Catalina to the latest version and apply any available security patches provided by Apple.
More information about CVE-2020-29622 can be found on the official Apple support website: https://support.apple.com/en-us/HT212805