First published: Wed Jul 15 2020(Updated: )
A memory corruption issue was addressed by removing the vulnerable code. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8. A malicious application may be able to break out of its sandbox.
Credit: Zhuo Liang Qihoo 360 Vulcan Team working with 360 BugCloud product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
tvOS | <13.4.8 | 13.4.8 |
macOS Catalina | <10.15.6 | 10.15.6 |
macOS Mojave | ||
macOS High Sierra | ||
Apple iOS, iPadOS, and watchOS | <13.6 | 13.6 |
Apple iOS, iPadOS, and watchOS | <13.6 | 13.6 |
Apple iOS, iPadOS, and watchOS | <6.2.8 | 6.2.8 |
Apple iOS, iPadOS, and watchOS | <13.6 | |
iOS | <13.6 | |
Apple iOS and macOS | <10.15.6 | |
tvOS | <13.4.8 | |
Apple iOS, iPadOS, and watchOS | <6.2.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID is CVE-2020-9865.
The title of the vulnerability is Crash Reporter.
The vulnerability is a memory corruption issue that was addressed by removing the vulnerable code.
The affected software products include macOS Catalina, Mojave, High Sierra, iOS, iPadOS, watchOS, and tvOS from Apple.
The severity level of this vulnerability is not specified.
To fix this vulnerability, update to the latest version of the affected software as recommended by Apple.
You can find more information about this vulnerability on Apple's support website.