First published: Tue Jan 28 2020(Updated: )
An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in iOS 13.3.1 and iPadOS 13.3.1, macOS Catalina 10.15.3, tvOS 13.3.1, watchOS 6.1.2. An application may be able to gain elevated privileges.
Credit: Ian Beer Google Project Zero product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
tvOS | <13.3.1 | 13.3.1 |
macOS Catalina | <10.15.3 | 10.15.3 |
macOS Mojave | ||
macOS High Sierra | ||
Apple iOS, iPadOS, and watchOS | <13.3.1 | 13.3.1 |
Apple iOS, iPadOS, and watchOS | <13.3.1 | 13.3.1 |
Apple iOS, iPadOS, and watchOS | <6.1.2 | 6.1.2 |
Apple iOS, iPadOS, and watchOS | <13.3.1 | |
iOS | <13.3.1 | |
Apple iOS and macOS | <10.15.3 | |
tvOS | <13.3.1 | |
Apple iOS, iPadOS, and watchOS | <6.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2020-3829 is a vulnerability in libxpc that allows for an out-of-bounds read, which has been addressed with improved bounds checking.
CVE-2020-3829 affects Apple tvOS up to version 13.3.1, Apple watchOS up to version 6.1.2, Apple iOS up to version 13.3.1, Apple iPadOS up to version 13.3.1, and Apple macOS Catalina up to version 10.15.3.
To fix CVE-2020-3829, it is recommended to update to the latest version of the affected software. For specific remediation steps, refer to the official Apple support articles.
You can find more information about CVE-2020-3829 in the official Apple support articles: [link1], [link2], [link3].
The severity of CVE-2020-3829 is not mentioned in the provided information.