First published: Wed Jul 15 2020(Updated: )
An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8. A malicious application may be able to determine kernel memory layout.
Credit: Xinru Chi Tielei Wang Pangu Lab product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
tvOS | <13.4.8 | 13.4.8 |
macOS Catalina | <10.15.6 | 10.15.6 |
macOS Mojave | ||
macOS High Sierra | ||
Apple iOS, iPadOS, and watchOS | <13.6 | 13.6 |
Apple iOS, iPadOS, and watchOS | <13.6 | 13.6 |
Apple iOS, iPadOS, and watchOS | <6.2.8 | 6.2.8 |
Apple iOS, iPadOS, and watchOS | <13.6 | |
iOS | <13.6 | |
Apple iOS and macOS | <10.15.6 | |
tvOS | <13.4.8 | |
Apple iOS, iPadOS, and watchOS | <6.2.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2020-9902 is an out-of-bounds read vulnerability in the Kernel that has been addressed with improved bounds checking.
CVE-2020-9902 affects macOS Catalina up to version 10.15.6, Mojave, High Sierra, iOS up to version 13.6, iPadOS up to version 13.6, watchOS up to version 6.2.8, and tvOS up to version 13.4.8.
The severity of CVE-2020-9902 is not specified.
To fix the CVE-2020-9902 vulnerability, make sure to update your software to the latest available version. Refer to the vendor's official support page for specific instructions.
You can find more information about CVE-2020-9902 on the official Apple support page: [link](https://support.apple.com/en-us/HT211289).