First published: Wed Sep 16 2020(Updated: )
FontParser. An out-of-bounds read was addressed with improved bounds checking.
Credit: Mickey Jin & Qi Sun Trend Micro working with Trend MicroMickey Jin & Qi Sun Trend Micro working with Trend MicroMickey Jin & Qi Sun Trend MicroMickey Jin & Qi Sun Trend Micro working with Trend Micro product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS | <11.0.1 | 11.0.1 |
tvOS | <14.0 | 14.0 |
Apple iOS, iPadOS, and watchOS | <14.0 | 14.0 |
Apple iOS, iPadOS, and watchOS | <14.0 | 14.0 |
Apple iOS, iPadOS, and watchOS | <7.0 | 7.0 |
Apple iOS, iPadOS, and watchOS | <14.0 | |
iOS | <14.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID for this issue is CVE-2020-29639.
The severity of CVE-2020-29639 has not been specified.
Apple tvOS up to version 14.0, Apple iOS up to version 14.0, Apple iPadOS up to version 14.0, Apple macOS Big Sur up to version 11.0.1, Apple watchOS up to version 7.0 are affected by CVE-2020-29639.
To fix the CVE-2020-29639 vulnerability, update to the latest version of the affected software as specified by Apple's security advisories.
You can find more information about CVE-2020-29639 on Apple's security advisories: [link1], [link2], [link3].