First published: Thu Nov 12 2020(Updated: )
A race condition was addressed with improved state handling. This issue is fixed in macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, macOS Big Sur 11.0.1. An application may be able to execute arbitrary code with kernel privileges.
Credit: product-security@apple.com Linus Henze (pinauten.de) Linus Henze (pinauten.de)
Affected Software | Affected Version | How to fix |
---|---|---|
Apple Mac OS X | <11.0.1 | |
Apple Mac OS X | <11.1.0 | |
Apple macOS Big Sur | <11.1 | 11.1 |
Apple Catalina | ||
Apple Mojave | ||
Apple macOS Big Sur | <11.0.1 | 11.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2020-27921 is a vulnerability in the Kernel that was addressed with improved state handling.
The affected software versions are macOS Big Sur 11.0.1 and 11.1, Apple Catalina, and Apple Mojave.
To fix CVE-2020-27921, update your macOS to the latest version available.
You can find more information about CVE-2020-27921 on the official Apple support page: [https://support.apple.com/en-us/HT212011](https://support.apple.com/en-us/HT212011) and [https://support.apple.com/en-us/HT211931](https://support.apple.com/en-us/HT211931).
The CWE for CVE-2020-27921 is 362.