First published: Mon Mar 25 2019(Updated: )
A buffer overflow was addressed with improved size validation. This issue is fixed in iOS 12.2, macOS Mojave 10.14.4, tvOS 12.2, watchOS 5.2. A remote attacker may be able to cause unexpected system termination or corrupt kernel memory.
Credit: Ned Williamson Googlederrek @derrekr6 Ned Williamson Googlederrek @derrekr6 Ned Williamson Googlederrek @derrekr6 Ned Williamson Googlederrek @derrekr6 product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iPhone OS | <12.2 | |
Apple Mac OS X | <10.14.4 | |
Apple tvOS | <12.2 | |
Apple watchOS | <5.2 | |
Apple macOS Mojave | <10.14.4 | 10.14.4 |
Apple High Sierra | ||
Apple Sierra | ||
Apple tvOS | <12.2 | 12.2 |
Apple iOS | <12.2 | 12.2 |
Apple watchOS | <5.2 | 5.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2019-8527 is a kernel vulnerability that was addressed with improved size validation.
The severity of CVE-2019-8527 is critical, with a severity value of 9.1.
iOS 12.2, macOS Mojave 10.14.4, tvOS 12.2, and watchOS 5.2 are affected by CVE-2019-8527.
A remote attacker may be able to cause unexpected system termination or corrupt kernel memory.
CVE-2019-8527 can be fixed by updating to iOS 12.2, macOS Mojave 10.14.4, tvOS 12.2, or watchOS 5.2.