First published: Wed Jul 15 2020(Updated: )
CoreCapture. A use after free issue was addressed with improved memory management.
Credit: Proteas Proteas Proteas Proteas Proteas product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS Catalina | <10.15.6 | 10.15.6 |
Apple Mojave | ||
Apple High Sierra | ||
Apple watchOS | <7.0 | 7.0 |
Apple tvOS | <14.0 | 14.0 |
Apple iOS | <14.0 | 14.0 |
Apple iPadOS | <14.0 | 14.0 |
Apple iPadOS | <14.0 | |
Apple iPhone OS | <14.0 | |
Apple Mac OS X | <10.15.6 | |
Apple Mac OS X | >=11.0.0<11.0.1 | |
Apple tvOS | <14.0 | |
Apple watchOS | <7.0 | |
Apple macOS | <11.0.1 | 11.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID for this issue is CVE-2020-9949.
The title of the vulnerability is CoreCapture. A use after free issue was addressed with improved memory management.
The affected software for this vulnerability includes macOS Catalina (10.15.6), Mojave, High Sierra, macOS Big Sur (11.0.1), tvOS (14.0), iOS (14.0), iPadOS (14.0), and watchOS (7.0).
The vulnerability was addressed with improved memory management.
You can find more information about this vulnerability on the Apple support website at the following links: [link1](https://support.apple.com/en-us/HT211289), [link2](https://support.apple.com/en-us/HT211843), [link3](https://support.apple.com/en-us/HT211844).