First published: Thu Nov 05 2020(Updated: )
An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in macOS Big Sur 11.0.1, iOS 14.2 and iPadOS 14.2, tvOS 14.2, watchOS 7.1. Processing a maliciously crafted font file may lead to arbitrary code execution.
Credit: Xingwei Lin Ant Security LightXingwei Lin Ant Security LightXingwei Lin Ant Security LightXingwei Lin Ant Security Light product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iPadOS | <14.2 | |
Apple iPhone OS | <14.2 | |
Apple macOS | <11.0.1 | |
Apple tvOS | <14.2 | |
Apple watchOS | <7.1 | |
Apple tvOS | <14.2 | 14.2 |
Apple watchOS | <7.1 | 7.1 |
Apple iOS | <14.2 | 14.2 |
Apple iPadOS | <14.2 | 14.2 |
Apple macOS Big Sur | <11.0.1 | 11.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2020-27927 is an out-of-bounds write vulnerability in FontParser that has been addressed with improved bounds checking.
iPhone and iPad devices running iOS 14.2, iPod devices running watchOS 7.1, Mac devices running macOS Big Sur 11.0.1, and Apple TV devices running tvOS 14.2 are affected by CVE-2020-27927.
The severity of CVE-2020-27927 is not mentioned in the information provided.
To fix CVE-2020-27927, update your affected Apple devices to the recommended versions: iOS 14.2, iPadOS 14.2, watchOS 7.1, macOS Big Sur 11.0.1, or tvOS 14.2, as specified by Apple.
You can find more information about CVE-2020-27927 on the Apple support website: [link1], [link2], [link3].