![]() Impact: A local user may be able to read kernel memory Impact: A local user may be able to cause unexpected system termination or read kernel memoryĭescription: A memory corruption issue was addressed with improved state management.ĬVE-2019-8545: Adam Donenfeld of the Zimperium zLabs TeamĪvailable for: macOS High Sierra 10.13.6, macOS Mojave 10.14.3 Scott Kemp of MIT, and Romke van Dijk of Z-CERT Impact: A Mac may not lock when disconnecting from an external monitorĭescription: A lock handling issue was addressed with improved lock handling.ĬVE-2019-8533: an anonymous researcher, James Eagan of Télécom ParisTech, R. Impact: An application may be able to read restricted memoryĬVE-2019-8519: Aleksandr Tarasikov Juwei Lin and Junzhi Lu of Trend Micro Research working with Trend Micro's Zero Day Initiative, Lilang Wu and Moony Li of Trend Micro Impact: Processing a maliciously crafted file might disclose user informationĭescription: An out-of-bounds read was addressed with improved bounds checking. Impact: A malicious application may be able to overwrite arbitrary filesĭescription: This issue was addressed with improved checks.ĬVE-2019-8521: CodeColorist of Ant-Financial LightYear Labs Impact: A malicious application may be able to gain root privilegesĭescription: A race condition was addressed with additional validation.ĬVE-2019-8565: CodeColorist of Ant-Financial LightYear Labs This issue was addressed with improved state management.ĬVE-2019-8777: Abdullah H. Impact: A local attacker may be able to view contacts from the lock screenĭescription: A lock screen issue allowed access to contacts on a locked device. The issue was resolved with improved logic.ĬVE-2019-8550: Lauren Guzniczak of Keystone Academy Impact: A user’s video may not be paused in a FaceTime call if they exit the FaceTime app while the call is ringingĭescription: An issue existed in the pausing of FaceTime video. Impact: An encrypted volume may be unmounted and remounted by a different user without prompting for the passwordĬVE-2019-8522: Colin Meginnis for: macOS Mojave 10.14.3 Impact: A malicious application may be able to elevate privilegesĭescription: A memory initialization issue was addressed with improved memory handling.ĬVE-2019-8552: Mohamed Ghannam for: macOS Mojave 10.14.3ĭescription: A buffer overflow issue was addressed with improved memory handling.ĭescription: A buffer overflow was addressed with improved bounds checking. Impact: Processing a maliciously crafted string may lead to a denial of serviceĭescription: A validation issue was addressed with improved logic. Impact: A malicious application may bypass Gatekeeper checksĭescription: This issue was addressed with improved handling of file metadata.ĬVE-2019-6239: Ian Moorhouse and Michael Trimm This was addressed with improved state management.ĬVE-2019-8534: Mac working with Trend Micro's Zero Day InitiativeĪvailable for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS Mojave 10.14.3ĭescription: A buffer overflow was addressed with improved size validation.ĬVE-2019-8555: Zhiyi Zhang of 360 ESG Codesafe Team, Zhuo Liang and shrek_wzw of Qihoo 360 Nirvan Team Impact: A malicious application may be able to execute arbitrary code with kernel privilegesĭescription: A logic issue existed resulting in memory corruption. Impact: Processing a maliciously crafted vcf file may lead to a denial of serviceĭescription: A denial of service issue was addressed with improved validation.ĬVE-2019-8538: Trevor Spiniolas added April 3, 2019 This issue was addressed with improved validation.ĬVE-2019-8531: an anonymous researcher, QA team of SecureW2 Impact: An untrusted radius server certificate may be trustedĭescription: A validation issue existed in Trust Anchor Management. Impact: An attacker in a privileged network position may be able to intercept network trafficĭescription: A logic issue was addressed with improved state management.ĬVE-2019-6203: Dominic White of SensePost added April 15, 2019
0 Comments
Leave a Reply. |