Impact: A local user may be able to cause unexpected system termination or read kernel memoryĭescription: An out-of-bounds read was addressed with improved input validation.ĬVE-2018-4434: Zhuo Liang of Qihoo 360 Nirvan TeamĬVE-2018-4456: Tyler Bohan of Cisco TalosĮntry added December 21, 2018, updated January 22, 2019Īvailable for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6ĭescription: A memory initialization issue was addressed with improved memory handling.ĬVE-2018-4421: Tyler Bohan of Cisco TalosĪvailable for: macOS Mojave 10.14.1, macOS High Sierra 10.13.6
Impact: A malicious application may be able to execute arbitrary code with system privilegesĭescription: A memory consumption issue was addressed with improved memory handling.ĬVE-2018-4452: Liu Long of Qihoo 360 Vulcan Team Impact: An application may be able to execute arbitrary code with kernel privilegesĭescription: A memory corruption issue was addressed with improved state management.ĬVE-2018-4467: Martim Carbone, David Vernet, Sam Scalise, and Fred Jacobs of the Virtual Machine Monitor Group of VMware, Inc. Impact: An application may be able to execute arbitrary code with system privilegesĭescription: A memory corruption issue was addressed with improved memory handling.ĬVE-2018-4463: Maksymilian Arciemowicz ()Īvailable for: macOS Sierra 10.12.6, macOS High Sierra 10.13.6, macOS Mojave 10.14.1
Impact: An application may be able to read restricted memoryĭescription: A validation issue was addressed with improved input sanitization.ĬVE-2018-4462: cocoahuke, Lilang Wu and Moony Li of TrendMicro Mobile Security Research Team working with Trend Micro's Zero Day Initiative Impact: A malicious application may be able to elevate privilegesĭescription: A type confusion issue was addressed with improved memory handling.ĬVE-2018-4303: Mohamed Ghannam updated December 21, 2018Īvailable for: macOS Sierra 10.12.6, macOS Mojave 10.14.1, macOS High Sierra 10.13.6