First published: Thu Nov 05 2020(Updated: )
CoreText. A logic issue was addressed with improved state management.
Credit: Mickey Jin Trend MicroMickey Jin Trend MicroMickey Jin Trend MicroMickey Jin Trend MicroMickey Jin Trend Micro product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple tvOS | <14.2 | 14.2 |
Apple watchOS | <7.1 | 7.1 |
Apple iOS | <14.2 | 14.2 |
Apple iPadOS | <14.2 | 14.2 |
Apple macOS Big Sur | <11.0.1 | 11.0.1 |
Apple macOS Big Sur | <11.1 | 11.1 |
Apple Catalina | ||
Apple Mojave | ||
Apple Mac OS X | <11.0.1 | |
Apple iPadOS | <14.2 | |
Apple iPhone OS | <14.2 | |
Apple Mac OS X | <11.1.0 | |
Apple tvOS | <14.2 | |
Apple watchOS | <7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2020-27922 is a vulnerability in CoreText that is caused by a logic issue related to state management.
The affected software versions include Apple iOS up to version 14.2, Apple iPadOS up to version 14.2, Apple tvOS up to version 14.2, Apple macOS Big Sur up to version 11.0.1, Apple watchOS up to version 7.1, Apple macOS Big Sur up to version 11.1, Apple Catalina, and Apple Mojave.
The severity of CVE-2020-27922 has not been specified.
To fix CVE-2020-27922, you should update your Apple devices to the latest available software versions mentioned in the Apple security advisory.
You can find more information about CVE-2020-27922 on the Apple support website. Here are the references: [link1], [link2], [link3].