First published: Tue Jan 28 2020(Updated: )
An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in iOS 13.3.1 and iPadOS 13.3.1, macOS Catalina 10.15.3, tvOS 13.3.1, watchOS 6.1.2. An application may be able to gain elevated privileges.
Credit: Ian Beer Google Project ZeroIan Beer Google Project ZeroIan Beer Google Project ZeroIan Beer Google Project Zero product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple tvOS | <13.3.1 | 13.3.1 |
Apple iOS | <13.3.1 | 13.3.1 |
Apple iPadOS | <13.3.1 | 13.3.1 |
Apple macOS Catalina | <10.15.3 | 10.15.3 |
Apple Mojave | ||
Apple High Sierra | ||
Apple watchOS | <6.1.2 | 6.1.2 |
Apple iPadOS | <13.3.1 | |
Apple iPhone OS | <13.3.1 | |
Apple Mac OS X | <10.15.3 | |
Apple tvOS | <13.3.1 | |
Apple watchOS | <6.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2020-3829 is a vulnerability in libxpc that allows for an out-of-bounds read, which has been addressed with improved bounds checking.
CVE-2020-3829 affects Apple tvOS up to version 13.3.1, Apple watchOS up to version 6.1.2, Apple iOS up to version 13.3.1, Apple iPadOS up to version 13.3.1, and Apple macOS Catalina up to version 10.15.3.
To fix CVE-2020-3829, it is recommended to update to the latest version of the affected software. For specific remediation steps, refer to the official Apple support articles.
You can find more information about CVE-2020-3829 in the official Apple support articles: [link1], [link2], [link3].
The severity of CVE-2020-3829 is not mentioned in the provided information.