First published: Wed Jul 15 2020(Updated: )
sysdiagnose. An issue existed within the path validation logic for symlinks. This issue was addressed with improved path sanitization.
Credit: Tim Michaud @TimGMichaud LeviathanZhongcheng Li (CK01) ZeroTim Michaud @TimGMichaud LeviathanZhongcheng Li (CK01) ZeroTim Michaud @TimGMichaud LeviathanZhongcheng Li (CK01) Zero product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
tvOS | <13.4.8 | 13.4.8 |
macOS Catalina | <10.15.6 | 10.15.6 |
macOS Mojave | ||
macOS High Sierra | ||
Apple iOS, iPadOS, and watchOS | <13.6 | 13.6 |
Apple iOS, iPadOS, and watchOS | <13.6 | 13.6 |
Apple iOS, iPadOS, and watchOS | <13.6 | |
iOS | <13.6 | |
Apple iOS and macOS | <10.15.6 | |
tvOS | <13.4.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2020-9901 is a vulnerability in macOS, iOS, iPadOS, and tvOS that allows for path validation logic bypass.
CVE-2020-9901 affects macOS Catalina version 10.15.6.
CVE-2020-9901 affects Apple Mojave.
CVE-2020-9901 affects Apple High Sierra.
CVE-2020-9901 affects iOS version up to 13.6.
CVE-2020-9901 affects iPadOS version up to 13.6.
CVE-2020-9901 affects tvOS version up to 13.4.8.
To fix CVE-2020-9901, update your operating system to the latest version available.