First published: Thu Nov 05 2020(Updated: )
libxml2. A use after free issue was addressed with improved memory management.
Credit: found by OSS-Fuzz found by OSS-Fuzz found by OSS-Fuzz found by OSS-Fuzz found by OSS-Fuzz found by OSS-Fuzz found by OSS-Fuzz found by OSS-Fuzz found by OSS-Fuzz product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple watchOS | <7.1 | 7.1 |
Apple Mac OS X | <11.0.1 | |
Apple iPadOS | <14.2 | |
Apple iPhone OS | <14.2 | |
Apple Mac OS X | <11.1.0 | |
Apple tvOS | <14.2 | |
Apple watchOS | <7.1 | |
Apple tvOS | <14.2 | 14.2 |
Apple iOS | <14.2 | 14.2 |
Apple iPadOS | <14.2 | 14.2 |
Apple macOS | <11.0.1 | 11.0.1 |
Apple macOS | <11.1 | 11.1 |
Apple Catalina | ||
Apple Mojave |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2020-27920 is a use after free issue in libxml2 that has been addressed with improved memory management.
The affected software products include Apple iOS up to version 14.2, Apple iPadOS up to version 14.2, Apple tvOS up to version 14.2, Apple macOS Big Sur up to version 11.0.1, Apple watchOS up to version 7.1, Apple Catalina, and Apple Mojave.
The severity of CVE-2020-27920 is not mentioned in the provided information.
To fix CVE-2020-27920, update your affected software products to the latest available versions as mentioned in the provided links from Apple support.
You can find more information about CVE-2020-27920 at the following references: [Link 1](https://support.apple.com/en-us/HT211929), [Link 2](https://support.apple.com/en-us/HT211930), [Link 3](https://support.apple.com/en-us/HT212011).