First published: Wed Jul 15 2020(Updated: )
CoreCapture. A use after free issue was addressed with improved memory management.
Credit: Proteas Proteas Proteas Proteas Proteas product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS | <11.0.1 | 11.0.1 |
tvOS | <14.0 | 14.0 |
macOS Catalina | <10.15.6 | 10.15.6 |
macOS Mojave | ||
macOS High Sierra | ||
Apple iOS, iPadOS, and watchOS | <14.0 | 14.0 |
Apple iOS, iPadOS, and watchOS | <14.0 | 14.0 |
Apple iOS, iPadOS, and watchOS | <7.0 | 7.0 |
Apple iOS, iPadOS, and watchOS | <14.0 | |
iOS | <14.0 | |
Apple iOS and macOS | <10.15.6 | |
Apple iOS and macOS | >=11.0.0<11.0.1 | |
tvOS | <14.0 | |
Apple iOS, iPadOS, and watchOS | <7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID for this issue is CVE-2020-9949.
The title of the vulnerability is CoreCapture. A use after free issue was addressed with improved memory management.
The affected software for this vulnerability includes macOS Catalina (10.15.6), Mojave, High Sierra, macOS Big Sur (11.0.1), tvOS (14.0), iOS (14.0), iPadOS (14.0), and watchOS (7.0).
The vulnerability was addressed with improved memory management.
You can find more information about this vulnerability on the Apple support website at the following links: [link1](https://support.apple.com/en-us/HT211289), [link2](https://support.apple.com/en-us/HT211843), [link3](https://support.apple.com/en-us/HT211844).