First published: Tue Jan 22 2019(Updated: )
Kernel. A memory corruption issue was addressed with improved lock state checking.
Credit: Ian Beer Google Project ZeroIan Beer Google Project Zero product-security@apple.com Ian Beer Google Project Zero product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS Mojave | <10.14.3 | 10.14.3 |
Apple High Sierra | ||
Apple Sierra | ||
Apple tvOS | <12.1.2 | 12.1.2 |
Apple iPhone OS | <12.1.3 | |
Apple Mac OS X | <10.14.3 | |
Apple tvOS | <12.1.2 | |
Apple iOS | <12.1.3 | 12.1.3 |
<12.1.3 | ||
<10.14.3 | ||
<12.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2019-6205 refers to a memory corruption issue that was addressed with improved lock state checking in Apple iOS 12.1.3, macOS Mojave 10.14.3, and tvOS 12.1.2.
CVE-2019-6205 has a severity level of 7.8 (high).
CVE-2019-6205 affects Apple iOS up to version 12.1.3, macOS Mojave up to version 10.14.3, and tvOS up to version 12.1.2.
A malicious application can exploit CVE-2019-6205 to cause unexpected changes in memory shared between processes.
You can find more information about CVE-2019-6205 on the following sources: [Packet Storm Security](http://packetstormsecurity.com/files/156051/XNU-vm_map_copy-Insufficient-Fix.html), [SecurityFocus](http://www.securityfocus.com/bid/106695), and [Apple Support](https://support.apple.com/HT209443).