First published: Wed Sep 16 2020(Updated: )
An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.0.1, watchOS 7.0, tvOS 14.0, iOS 14.0 and iPadOS 14.0. An application may be able to execute arbitrary code with kernel privileges.
Credit: Proteas Proteas Proteas Proteas Proteas Proteas Proteas Proteas product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple tvOS | <14.0 | 14.0 |
Apple watchOS | <7.0 | 7.0 |
Apple iOS | <14.0 | 14.0 |
Apple iPadOS | <14.0 | 14.0 |
Apple macOS Big Sur | <11.0.1 | 11.0.1 |
Apple iPadOS | <14.0 | |
Apple iPhone OS | <14.0 | |
Apple macOS | <11.0.1 | |
Apple tvOS | <14.0 | |
Apple watchOS | <7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID is CVE-2020-9965.
The title of the vulnerability is 'Disk Images'.
The vulnerability is an out-of-bounds read that was addressed with improved input validation.
The following software versions are affected: Apple tvOS up to version 14.0, Apple iOS up to version 14.0, Apple iPadOS up to version 14.0, Apple macOS Big Sur up to version 11.0.1, Apple watchOS up to version 7.0.
To fix this vulnerability, update your software to the latest version available. Details can be found in the following references: [Reference 1](https://support.apple.com/en-us/HT211843), [Reference 2](https://support.apple.com/en-us/HT211844), [Reference 3](https://support.apple.com/en-us/HT211850).