First published: Wed Dec 05 2018(Updated: )
Kernel. A memory initialization issue was addressed with improved memory handling.
Credit: An independent security researcher has reported this vulnerability to Beyond Security’s SecuriTeam Secure Disclosure program An independent security researcher has reported this vulnerability to Beyond Security’s SecuriTeam Secure Disclosure program An independent security researcher has reported this vulnerability to Beyond Security’s SecuriTeam Secure Disclosure program An independent security researcher has reported this vulnerability to Beyond Security’s SecuriTeam Secure Disclosure program Brandon Azad product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iPhone OS | <12.1.1 | |
Apple Mac OS X | >=10.12.6<10.14.4 | |
Apple tvOS | <12.1.1 | |
Apple watchOS | <5.1.2 | |
Apple Mac OS X | >=10.13.6<10.14.2 | |
Apple macOS Mojave | <10.14.4 | 10.14.4 |
Apple High Sierra | ||
Apple Sierra | ||
Apple iOS | <12.1.1 | 12.1.1 |
Apple tvOS | <12.1.1 | 12.1.1 |
Apple watchOS | <5.1.2 | 5.1.2 |
Apple macOS Mojave | <10.14.2 | 10.14.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2018-4448 is a vulnerability related to a memory initialization issue in the Kernel that has been addressed with improved memory handling.
CVE-2018-4448 has a severity level of medium with a CVSS score of 5.5.
The vulnerability affects macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra, iOS 12.1.1, watchOS 5.1.2, macOS Mojave 10.14.2, Security Update 2018-003 High Sierra, Security Update 2018-0...
To fix CVE-2018-4448, you should update your software to the fixed versions: macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra, iOS 12.1.1, watchOS 5.1.2, macOS Mojave 10.14.2, Security Update 2018...
You can find more information about CVE-2018-4448 at the following references: [link1], [link2], [link3].