First published: Thu Nov 05 2020(Updated: )
A use after free issue was addressed with improved memory management. This issue is fixed in iOS 14.2 and iPadOS 14.2. Processing maliciously crafted web content may lead to arbitrary code execution.
Credit: found by OSS-Fuzz found by OSS-Fuzz product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iOS | <14.2 | 14.2 |
Apple iPadOS | <14.2 | 14.2 |
Apple iPadOS | <14.2 | |
Apple iPhone OS | <14.2 | |
Apple macOS Big Sur | <11.1 | 11.1 |
Apple Catalina | ||
Apple Mojave |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2020-27926 is a vulnerability in libxml2 that could allow an attacker to execute arbitrary code or cause a denial of service.
CVE-2020-27926 affects Apple iOS up to version 14.2, Apple iPadOS up to version 14.2, Apple macOS Big Sur up to version 11.1, Apple Catalina, and Apple Mojave.
CVE-2020-27926 has a severity rating of critical.
To fix CVE-2020-27926, update your affected software to the latest available version provided by Apple.
You can find more information about CVE-2020-27926 at the following references: [Apple Support Article 1](https://support.apple.com/en-us/HT211929) and [Apple Support Article 2](https://support.apple.com/en-us/HT212011).