First published: Thu Nov 05 2020(Updated: )
libxml2. A use after free issue was addressed with improved memory management.
Credit: found by OSS-Fuzz found by OSS-Fuzz found by OSS-Fuzz found by OSS-Fuzz found by OSS-Fuzz found by OSS-Fuzz found by OSS-Fuzz found by OSS-Fuzz found by OSS-Fuzz product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS Big Sur | <11.1 | 11.1 |
Apple Catalina | ||
Apple Mojave | ||
Apple Mac OS X | <11.0.1 | |
Apple iPadOS | <14.2 | |
Apple iPhone OS | <14.2 | |
Apple Mac OS X | <11.1.0 | |
Apple tvOS | <14.2 | |
Apple watchOS | <7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2020-27920 is a use after free issue in libxml2 that has been addressed with improved memory management.
The affected software products include Apple iOS up to version 14.2, Apple iPadOS up to version 14.2, Apple tvOS up to version 14.2, Apple macOS Big Sur up to version 11.0.1, Apple watchOS up to version 7.1, Apple Catalina, and Apple Mojave.
The severity of CVE-2020-27920 is not mentioned in the provided information.
To fix CVE-2020-27920, update your affected software products to the latest available versions as mentioned in the provided links from Apple support.
You can find more information about CVE-2020-27920 at the following references: [Link 1](https://support.apple.com/en-us/HT211929), [Link 2](https://support.apple.com/en-us/HT211930), [Link 3](https://support.apple.com/en-us/HT212011).