var-201912-0457
Vulnerability from variot
A validation issue was addressed with improved logic. This issue is fixed in iOS 12.2, tvOS 12.2, watchOS 5.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may result in the disclosure of process memory. iCloud , iTunes , Safari Multiple Apple products contain vulnerabilities related to input validation.Information may be obtained. Apple Safari could allow a remote malicious user to obtain sensitive information, caused by a validation issue in the WebKit component. By persuading a victim to visit a specially-crafted Web site, a remote attacker could exploit this vulnerability to obtain sensitive information. CVE-2019-8546: ChiYuan Chang
Passcode Available for: Apple Watch Series 1 and later Impact: A partially entered passcode may not clear when the device goes to sleep Description: An issue existed where partially entered passcodes may not clear when the device went to sleep. This issue was addressed by clearing the passcode when a locked device sleeps.
Alternatively, on your watch, select "My Watch > General > About". -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
APPLE-SA-2019-3-25-1 iOS 12.2
iOS 12.2 is now available and addresses the following:
CFString Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Processing a maliciously crafted string may lead to a denial of service Description: A validation issue was addressed with improved logic. CVE-2019-8516: SWIPS Team of Frifee Inc.
configd Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A malicious application may be able to elevate privileges Description: A memory initialization issue was addressed with improved memory handling. CVE-2019-8552: Mohamed Ghannam (@_simo36)
Contacts Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A malicious application may be able to elevate privileges Description: A buffer overflow issue was addressed with improved memory handling. CVE-2019-8511: an anonymous researcher
CoreCrypto Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A malicious application may be able to elevate privileges Description: A buffer overflow was addressed with improved bounds checking. CVE-2019-8542: an anonymous researcher
Exchange ActiveSync Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A user may authorize an enterprise administrator to remotely wipe their device without appropriate disclosure Description: This issue was addressed with improved transparency. CVE-2019-8512: an anonymous researcher, an anonymous researcher
FaceTime Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A user's video may not be paused in a FaceTime call if they exit the FaceTime app while the call is ringing Description: An issue existed in the pausing of FaceTime video. CVE-2019-8550: Lauren Guzniczak of Keystone Academy
Feedback Assistant Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A malicious application may be able to gain root privileges Description: A race condition was addressed with additional validation. CVE-2019-8565: CodeColorist of Ant-Financial LightYear Labs
Feedback Assistant Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A malicious application may be able to overwrite arbitrary files Description: This issue was addressed with improved checks. CVE-2019-8521: CodeColorist of Ant-Financial LightYear Labs
file Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Processing a maliciously crafted file might disclose user information Description: An out-of-bounds read was addressed with improved bounds checking. CVE-2019-6237: an anonymous researcher
GeoServices Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Clicking a malicious SMS link may lead to arbitrary code execution Description: A memory corruption issue was addressed with improved validation. CVE-2019-8553: an anonymous researcher
iAP Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A malicious application may be able to elevate privileges Description: A buffer overflow was addressed with improved bounds checking. CVE-2019-8542: an anonymous researcher
IOHIDFamily Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A local user may be able to cause unexpected system termination or read kernel memory Description: A memory corruption issue was addressed with improved state management. CVE-2019-8545: Adam Donenfeld (@doadam) of the Zimperium zLabs Team
IOKit Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A local user may be able to read kernel memory Description: A memory initialization issue was addressed with improved memory handling. CVE-2019-8504: an anonymous researcher
IOKit SCSI Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: An application may be able to execute arbitrary code with kernel privileges Description: A memory corruption issue was addressed with improved input validation. CVE-2019-8529: Juwei Lin (@panicaII) of Trend Micro
Kernel Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A remote attacker may be able to cause unexpected system termination or corrupt kernel memory Description: A buffer overflow was addressed with improved size validation. CVE-2019-8527: Ned Williamson of Google and derrek (@derrekr6)
Kernel Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: An application may be able to gain elevated privileges Description: A logic issue was addressed with improved state management. CVE-2019-8514: Samuel Groß of Google Project Zero
Kernel Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A malicious application may be able to determine kernel memory layout Description: A memory initialization issue was addressed with improved memory handling. CVE-2019-8540: Weibo Wang (@ma1fan) of Qihoo 360 Nirvan Team
Kernel Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A local user may be able to read kernel memory Description: A memory corruption issue was addressed with improved memory handling. CVE-2019-7293: Ned Williamson of Google
Kernel Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A malicious application may be able to determine kernel memory layout Description: An out-of-bounds read issue existed that led to the disclosure of kernel memory. CVE-2019-6207: Weibo Wang of Qihoo 360 Nirvan Team (@ma1fan) CVE-2019-8510: Stefan Esser of Antid0te UG
Mail Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Processing a maliciously crafted mail message may lead to S/MIME signature spoofing Description: This issue was addressed with improved checks. CVE-2019-7284: Damian Poddebniak of Münster University of Applied Sciences
Messages Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A local user may be able to view sensitive user information Description: An access issue was addressed with additional sandbox restrictions. CVE-2019-8546: ChiYuan Chang
Power Management Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A malicious application may be able to execute arbitrary code with system privileges Description: Multiple input validation issues existed in MIG generated code. CVE-2019-8549: Mohamed Ghannam (@_simo36) of SSD Secure Disclosure (ssd-disclosure.com)
Privacy Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A malicious app may be able to track users between installs Description: A privacy issue existed in motion sensor calibration. CVE-2019-8541: Stan (Jiexin) Zhang and Alastair R. Beresford of the University of Cambridge, Ian Sheret of Polymath Insight Limited
ReplayKit Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A malicious application may be able to access the microphone without indication to the user Description: An API issue existed in the handling of microphone data. CVE-2019-8566: an anonymous researcher
Safari Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A website may be able to access sensor information without user consent Description: A permissions issue existed in the handling of motion and orientation data. CVE-2019-8554: an anonymous researcher
Safari Reader Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Enabling the Safari Reader feature on a maliciously crafted webpage may lead to universal cross site scripting Description: A logic issue was addressed with improved validation. CVE-2019-6204: Ryan Pickren (ryanpickren.com) CVE-2019-8505: Ryan Pickren (ryanpickren.com)
Siri Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A malicious application may be able to initiate a Dictation request without user authorization Description: An API issue existed in the handling of dictation requests. CVE-2019-8502: Luke Deshotels of North Carolina State University, Jordan Beichler of North Carolina State University, William Enck of North Carolina State University, Costin Carabaș of University POLITEHNICA of Bucharest, and Răzvan Deaconescu of University POLITEHNICA of Bucharest
TrueTypeScaler Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Processing a maliciously crafted font may result in the disclosure of process memory Description: An out-of-bounds read was addressed with improved bounds checking. CVE-2019-8517: riusksk of VulWar Corp working with Trend Micro Zero Day Initiative
WebKit Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Processing maliciously crafted web content may lead to universal cross site scripting Description: A logic issue was addressed with improved validation. CVE-2019-8551: Ryan Pickren (ryanpickren.com)
WebKit Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: A memory corruption issue was addressed with improved state management. CVE-2019-8535: Zhiyang Zeng (@Wester) of Tencent Blade Team
WebKit Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: Multiple memory corruption issues were addressed with improved memory handling. Geshev working with Trend Micro Zero Day Initiative CVE-2019-8558: Samuel Groß of Google Project Zero CVE-2019-8559: Apple CVE-2019-8563: Apple
WebKit Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A sandboxed process may be able to circumvent sandbox restrictions Description: A memory corruption issue was addressed with improved validation. CVE-2019-8562: Wen Xu of SSLab at Georgia Tech and Hanqing Zhao of Chaitin Security Research Lab
WebKit Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A website may be able to access the microphone without the microphone use indicator being shown Description: A consistency issue was addressed with improved state handling. CVE-2019-6222: Denis Markov of Resonance Software
WebKit Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: A memory corruption issue was addressed with improved memory handling. CVE-2019-8536: Apple CVE-2019-8544: an anonymous researcher
WebKit Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Processing maliciously crafted web content may disclose sensitive user information Description: A cross-origin issue existed with the fetch API. CVE-2019-8515: James Lee (@Windowsrcer)
WebKit Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: A use after free issue was addressed with improved memory management. CVE-2019-7285: dwfault working at ADLab of Venustech CVE-2019-8556: Apple
WebKit Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: A type confusion issue was addressed with improved memory handling. CVE-2019-8506: Samuel Groß of Google Project Zero
WebKit Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A malicious website may be able to execute scripts in the context of another website Description: A logic issue was addressed with improved validation. CVE-2019-7292: Zhunki and Zhiyi Zhang of 360 ESG Codesafe Team
Wi-Fi Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A device may be passively tracked by its WiFi MAC address Description: A user privacy issue was addressed by removing the broadcast MAC address. CVE-2019-8567: David Kreitschmann and Milan Stute of Secure Mobile Networking Lab at Technische Universität Darmstadt
XPC Available for: iPhone 5s and later, iPad Air and later, and iPod touch 6th generation Impact: A malicious application may be able to overwrite arbitrary files Description: This issue was addressed with improved checks. CVE-2019-8530: CodeColorist of Ant-Financial LightYear Labs
Additional recognition
Books We would like to acknowledge Yiğit Can YILMAZ (@yilmazcanyigit) for their assistance.
Calendar We would like to acknowledge Peter Hempsall of 104days.com, Sascha Mogler of mogler.com, and an anonymous researcher for their assistance.
Quick Look We would like to acknowledge Yiğit Can YILMAZ (@yilmazcanyigit) for their assistance.
Safari We would like to acknowledge Nikhil Mittal (@c0d3G33k) of Payatu Labs (payatu.com) for their assistance.
Screen Time We would like to acknowledge Brandon Moore (@Brandonsecurity) for their assistance.
WebKit We would like to acknowledge Andrey Kovalev of Yandex Security Team for their assistance.
Installation note:
This update is available through iTunes and Software Update on your iOS device, and will not appear in your computer's Software Update application, or in the Apple Downloads site. Make sure you have an Internet connection and have installed the latest version of iTunes from https://www.apple.com/itunes/
iTunes and Software Update on the device will automatically check Apple's update server on its weekly schedule. When an update is detected, it is downloaded and the option to be installed is presented to the user when the iOS device is docked. We recommend applying the update immediately if possible. Selecting Don't Install will present the option the next time you connect your iOS device.
The automatic update process may take up to a week depending on the day that iTunes or the device checks for updates. You may manually obtain the update via the Check for Updates button within iTunes, or the Software Update on your device.
To check that the iPhone, iPod touch, or iPad has been updated:
- Navigate to Settings
- Select General
- Select About. The version after applying this update will be "iOS 12.2".
Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE-----
iQJdBAEBCABHFiEEDNXJVNCJJEAVmJdZeC9tht7TK3EFAlyZM7opHHByb2R1Y3Qt c2VjdXJpdHktbm9yZXBseUBsaXN0cy5hcHBsZS5jb20ACgkQeC9tht7TK3GIIBAA kEosQIr8/w6Qjtw2KzO753EFWM0kp4Ylv1Z0hlrAAX3YROpt18Xq+RWTgJ+3yhXu 136ZfBYEOJx+Jxv7nokB+ZvP1832WqccV1XU4XVxxsGvEshyFeXrIWxHz9a6aTi9 ozTTzJ5N9pZnd+ImJp51TQ8Q38KoqUPMU2stTr/SYE43S/9bz28fFTXHBS6WQBMz fgevfhMV0Ty3QnuIpLeeCZ1SwC51a0yZ/BV88E+G8xgplgh2R8Mc2bZosP8JIjMx 7KdtpBh30+BvB++MzteQG0gE+aIs6p4CLPgzkm67UZApbKIlYJxkZXv/pIy+DdS1 LGwBwZ5TRJ73uAGZO7jtpx6FNN3sSthI84y5x7df+hretVSFTqsEAErcI4Ns8HiD m3Jd3OJxMBEGC7SVz+r8IfkwnyQxurQMDj063ojsT6HBUOTZcYn6VX/h37MCwnO4 +GVFivjZklbp/lt7WiGs2j4mDs7jgt5SsNm0K3Nm/2EOT3I2HNc/8msJBbH/uF9h dVYsC8+7uEDqHIQ30FO2NCUzJrtjWHA1rxLS0XnY1uvv/09LjPMc/Y1VuIuvKSuZ Xv7+V5tCjaZRMow6IwH0qON30O0puRr6YnJchRO7TILCoW5bibzX5oxeJm2E6lsK SjGjz4yWGw+2VFkNkFbbA8OKSZYk4ck2WdWgf6s0Vgc= =VAWG -----END PGP SIGNATURE-----= . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201909-05
https://security.gentoo.org/
Severity: Normal Title: WebkitGTK+: Multiple vulnerabilities Date: September 06, 2019 Bugs: #683234, #686216, #693122 ID: 201909-05
Synopsis
Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in the arbitrary execution of code.
Background
WebKitGTK+ is a full-featured port of the WebKit rendering engine, suitable for projects requiring any kind of web integration, from hybrid HTML/CSS applications to full-fledged web browsers.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-libs/webkit-gtk < 2.24.4 >= 2.24.4
Description
Multiple vulnerabilities have been discovered in WebkitGTK+. Please review the CVE identifiers referenced below for details.
Workaround
There is no known workaround at this time.
Resolution
All WebkitGTK+ users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-libs/webkit-gtk-2.24.4"
References
[ 1 ] CVE-2019-11070 https://nvd.nist.gov/vuln/detail/CVE-2019-11070 [ 2 ] CVE-2019-6201 https://nvd.nist.gov/vuln/detail/CVE-2019-6201 [ 3 ] CVE-2019-6251 https://nvd.nist.gov/vuln/detail/CVE-2019-6251 [ 4 ] CVE-2019-7285 https://nvd.nist.gov/vuln/detail/CVE-2019-7285 [ 5 ] CVE-2019-7292 https://nvd.nist.gov/vuln/detail/CVE-2019-7292 [ 6 ] CVE-2019-8503 https://nvd.nist.gov/vuln/detail/CVE-2019-8503 [ 7 ] CVE-2019-8506 https://nvd.nist.gov/vuln/detail/CVE-2019-8506 [ 8 ] CVE-2019-8515 https://nvd.nist.gov/vuln/detail/CVE-2019-8515 [ 9 ] CVE-2019-8518 https://nvd.nist.gov/vuln/detail/CVE-2019-8518 [ 10 ] CVE-2019-8523 https://nvd.nist.gov/vuln/detail/CVE-2019-8523 [ 11 ] CVE-2019-8524 https://nvd.nist.gov/vuln/detail/CVE-2019-8524 [ 12 ] CVE-2019-8535 https://nvd.nist.gov/vuln/detail/CVE-2019-8535 [ 13 ] CVE-2019-8536 https://nvd.nist.gov/vuln/detail/CVE-2019-8536 [ 14 ] CVE-2019-8544 https://nvd.nist.gov/vuln/detail/CVE-2019-8544 [ 15 ] CVE-2019-8551 https://nvd.nist.gov/vuln/detail/CVE-2019-8551 [ 16 ] CVE-2019-8558 https://nvd.nist.gov/vuln/detail/CVE-2019-8558 [ 17 ] CVE-2019-8559 https://nvd.nist.gov/vuln/detail/CVE-2019-8559 [ 18 ] CVE-2019-8563 https://nvd.nist.gov/vuln/detail/CVE-2019-8563 [ 19 ] CVE-2019-8595 https://nvd.nist.gov/vuln/detail/CVE-2019-8595 [ 20 ] CVE-2019-8607 https://nvd.nist.gov/vuln/detail/CVE-2019-8607 [ 21 ] CVE-2019-8615 https://nvd.nist.gov/vuln/detail/CVE-2019-8615 [ 22 ] CVE-2019-8644 https://nvd.nist.gov/vuln/detail/CVE-2019-8644 [ 23 ] CVE-2019-8644 https://nvd.nist.gov/vuln/detail/CVE-2019-8644 [ 24 ] CVE-2019-8649 https://nvd.nist.gov/vuln/detail/CVE-2019-8649 [ 25 ] CVE-2019-8649 https://nvd.nist.gov/vuln/detail/CVE-2019-8649 [ 26 ] CVE-2019-8658 https://nvd.nist.gov/vuln/detail/CVE-2019-8658 [ 27 ] CVE-2019-8658 https://nvd.nist.gov/vuln/detail/CVE-2019-8658 [ 28 ] CVE-2019-8666 https://nvd.nist.gov/vuln/detail/CVE-2019-8666 [ 29 ] CVE-2019-8666 https://nvd.nist.gov/vuln/detail/CVE-2019-8666 [ 30 ] CVE-2019-8669 https://nvd.nist.gov/vuln/detail/CVE-2019-8669 [ 31 ] CVE-2019-8669 https://nvd.nist.gov/vuln/detail/CVE-2019-8669 [ 32 ] CVE-2019-8671 https://nvd.nist.gov/vuln/detail/CVE-2019-8671 [ 33 ] CVE-2019-8671 https://nvd.nist.gov/vuln/detail/CVE-2019-8671 [ 34 ] CVE-2019-8672 https://nvd.nist.gov/vuln/detail/CVE-2019-8672 [ 35 ] CVE-2019-8672 https://nvd.nist.gov/vuln/detail/CVE-2019-8672 [ 36 ] CVE-2019-8673 https://nvd.nist.gov/vuln/detail/CVE-2019-8673 [ 37 ] CVE-2019-8673 https://nvd.nist.gov/vuln/detail/CVE-2019-8673 [ 38 ] CVE-2019-8676 https://nvd.nist.gov/vuln/detail/CVE-2019-8676 [ 39 ] CVE-2019-8676 https://nvd.nist.gov/vuln/detail/CVE-2019-8676 [ 40 ] CVE-2019-8677 https://nvd.nist.gov/vuln/detail/CVE-2019-8677 [ 41 ] CVE-2019-8677 https://nvd.nist.gov/vuln/detail/CVE-2019-8677 [ 42 ] CVE-2019-8678 https://nvd.nist.gov/vuln/detail/CVE-2019-8678 [ 43 ] CVE-2019-8678 https://nvd.nist.gov/vuln/detail/CVE-2019-8678 [ 44 ] CVE-2019-8679 https://nvd.nist.gov/vuln/detail/CVE-2019-8679 [ 45 ] CVE-2019-8679 https://nvd.nist.gov/vuln/detail/CVE-2019-8679 [ 46 ] CVE-2019-8680 https://nvd.nist.gov/vuln/detail/CVE-2019-8680 [ 47 ] CVE-2019-8680 https://nvd.nist.gov/vuln/detail/CVE-2019-8680 [ 48 ] CVE-2019-8681 https://nvd.nist.gov/vuln/detail/CVE-2019-8681 [ 49 ] CVE-2019-8681 https://nvd.nist.gov/vuln/detail/CVE-2019-8681 [ 50 ] CVE-2019-8683 https://nvd.nist.gov/vuln/detail/CVE-2019-8683 [ 51 ] CVE-2019-8683 https://nvd.nist.gov/vuln/detail/CVE-2019-8683 [ 52 ] CVE-2019-8684 https://nvd.nist.gov/vuln/detail/CVE-2019-8684 [ 53 ] CVE-2019-8684 https://nvd.nist.gov/vuln/detail/CVE-2019-8684 [ 54 ] CVE-2019-8686 https://nvd.nist.gov/vuln/detail/CVE-2019-8686 [ 55 ] CVE-2019-8686 https://nvd.nist.gov/vuln/detail/CVE-2019-8686 [ 56 ] CVE-2019-8687 https://nvd.nist.gov/vuln/detail/CVE-2019-8687 [ 57 ] CVE-2019-8687 https://nvd.nist.gov/vuln/detail/CVE-2019-8687 [ 58 ] CVE-2019-8688 https://nvd.nist.gov/vuln/detail/CVE-2019-8688 [ 59 ] CVE-2019-8688 https://nvd.nist.gov/vuln/detail/CVE-2019-8688 [ 60 ] CVE-2019-8689 https://nvd.nist.gov/vuln/detail/CVE-2019-8689 [ 61 ] CVE-2019-8689 https://nvd.nist.gov/vuln/detail/CVE-2019-8689 [ 62 ] CVE-2019-8690 https://nvd.nist.gov/vuln/detail/CVE-2019-8690 [ 63 ] CVE-2019-8690 https://nvd.nist.gov/vuln/detail/CVE-2019-8690 [ 64 ] WSA-2019-0002 https://webkitgtk.org/security/WSA-2019-0002.html [ 65 ] WSA-2019-0004 https://webkitgtk.org/security/WSA-2019-0004.html
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
https://security.gentoo.org/glsa/201909-05
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2019 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5 .
Installation note:
Safari 12.1 may be obtained from the Mac App Store. ------------------------------------------------------------------------ WebKitGTK and WPE WebKit Security Advisory WSA-2019-0002
Date reported : April 10, 2019 Advisory ID : WSA-2019-0002 WebKitGTK Advisory URL : https://webkitgtk.org/security/WSA-2019-0002.html WPE WebKit Advisory URL : https://wpewebkit.org/security/WSA-2019-0002.html CVE identifiers : CVE-2019-6201, CVE-2019-6251, CVE-2019-7285, CVE-2019-7292, CVE-2019-8503, CVE-2019-8506, CVE-2019-8515, CVE-2019-8518, CVE-2019-8523, CVE-2019-8524, CVE-2019-8535, CVE-2019-8536, CVE-2019-8544, CVE-2019-8551, CVE-2019-8558, CVE-2019-8559, CVE-2019-8563, CVE-2019-11070.
Several vulnerabilities were discovered in WebKitGTK and WPE WebKit.
CVE-2019-6201 Versions affected: WebKitGTK before 2.22.6 and WPE WebKit before 2.22.4. Credit to dwfault working with ADLab of Venustech.
CVE-2019-6251 Versions affected: WebKitGTK and WPE WebKit before 2.24.1. Credit to Dhiraj. WebKitGTK and WPE WebKit were vulnerable to a URI spoofing attack similar to the CVE-2018-8383 issue in Microsoft Edge.
CVE-2019-7285 Versions affected: WebKitGTK before 2.22.6 and WPE WebKit before 2.22.4. Credit to dwfault working at ADLab of Venustech.
CVE-2019-7292 Versions affected: WebKitGTK before 2.22.6 and WPE WebKit before 2.22.4. Credit to Zhunki and Zhiyi Zhang of 360 ESG Codesafe Team.
CVE-2019-8503 Versions affected: WebKitGTK before 2.22.6 and WPE WebKit before 2.22.4. Credit to Linus S\xe4rud of Detectify. A malicious website may be able to execute scripts in the context of another website.
CVE-2019-8506 Versions affected: WebKitGTK and WPE WebKit before 2.24.0. Credit to Samuel Gro\xdf of Google Project Zero.
CVE-2019-8515 Versions affected: WebKitGTK before 2.22.6 and WPE WebKit before 2.22.4. Credit to James Lee, @Windowsrcer. A cross-origin issue existed with the fetch API.
CVE-2019-8518 Versions affected: WebKitGTK before 2.22.7 and WPE WebKit before 2.22.5. Credit to Samuel Gro\xdf of Google Project Zero.
CVE-2019-8523 Versions affected: WebKitGTK before 2.22.7 and WPE WebKit before 2.22.5. Credit to Apple.
CVE-2019-8524 Versions affected: WebKitGTK and WPE WebKit before 2.24.0. Credit to G. Geshev working with Trend Micro Zero Day Initiative.
CVE-2019-8535 Versions affected: WebKitGTK and WPE WebKit before 2.24.0. Credit to Zhiyang Zeng, @Wester, of Tencent Blade Team.
CVE-2019-8536 Versions affected: WebKitGTK and WPE WebKit before 2.24.0. Credit to Apple.
CVE-2019-8544 Versions affected: WebKitGTK and WPE WebKit before 2.24.0. Credit to an anonymous researcher.
CVE-2019-8551 Versions affected: WebKitGTK and WPE WebKit before 2.24.0. Credit to Ryan Pickren, ryanpickren.com.
CVE-2019-8558 Versions affected: WebKitGTK and WPE WebKit before 2.24.0. Credit to Samuel Gro\xdf of Google Project Zero.
CVE-2019-8559 Versions affected: WebKitGTK and WPE WebKit before 2.24.0. Credit to Apple.
CVE-2019-8563 Versions affected: WebKitGTK and WPE WebKit before 2.24.0. Credit to Apple.
CVE-2019-11070 Versions affected: WebKitGTK and WPE WebKit before 2.24.1. Credit to Igalia. WebKitGTK and WPE WebKit failed to properly apply configured HTTP proxy settings when downloading livestream video (HLS, DASH, or Smooth Streaming), an error resulting in deanonymization. This issue was corrected by changing the way livestreams are downloaded.
We recommend updating to the latest stable versions of WebKitGTK and WPE WebKit. It is the best way to ensure that you are running safe versions of WebKit. Please check our websites for information about the latest stable releases.
Further information about WebKitGTK and WPE WebKit security advisories can be found at: https://webkitgtk.org/security.html or https://wpewebkit.org/security/.
The WebKitGTK and WPE WebKit team, April 10, 2019
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201912-0457", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "safari", "scope": "lt", "trust": 1.0, "vendor": "apple", "version": "12.1" }, { "model": "tvos", "scope": "lt", "trust": 1.0, "vendor": "apple", "version": "12.2" }, { "model": "watchos", "scope": "lt", "trust": 1.0, "vendor": "apple", "version": "5.2" }, { "model": "icloud", "scope": "lt", "trust": 1.0, "vendor": "apple", "version": "7.11" }, { "model": "iphone os", "scope": "lt", "trust": 1.0, "vendor": "apple", "version": "12.2" }, { "model": "itunes", "scope": "lt", "trust": 1.0, "vendor": "apple", "version": "12.9.4" }, { "model": "itunes", "scope": null, "trust": 0.8, "vendor": "\u30a2\u30c3\u30d7\u30eb", "version": null }, { "model": "ios", "scope": null, "trust": 0.8, "vendor": "\u30a2\u30c3\u30d7\u30eb", "version": null }, { "model": "watchos", "scope": "eq", "trust": 0.8, "vendor": "\u30a2\u30c3\u30d7\u30eb", "version": "5.2" }, { "model": "safari", "scope": null, "trust": 0.8, "vendor": "\u30a2\u30c3\u30d7\u30eb", "version": null }, { "model": "tvos", "scope": null, "trust": 0.8, "vendor": "\u30a2\u30c3\u30d7\u30eb", "version": null }, { "model": "icloud", "scope": null, "trust": 0.8, "vendor": "\u30a2\u30c3\u30d7\u30eb", "version": null }, { "model": "icloud", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "6.1.1" }, { "model": "icloud", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "7.7" }, { "model": "icloud", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "7.8.1" }, { "model": "icloud", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "7.10" }, { "model": "itunes", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "12.1.3" }, { "model": "itunes", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "12.5.5" }, { "model": "itunes", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "12.9" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": null }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "1.0" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "1.0.0" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "1.0.0b1" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "1.0.0b2" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "1.0.1" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "1.0.2" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "1.0.3" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "1.0b1" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "1.1" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "1.1.0" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "1.1.1" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "1.2" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "1.2.0" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "1.2.1" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "1.2.2" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "1.2.3" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "1.2.4" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "1.2.5" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "1.3" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "1.3.0" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "1.3.1" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "1.3.2" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "2" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "2.0" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "2.0.0" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "2.0.1" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "2.0.2" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "2.0.3" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "2.0.4" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.0" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.0.0" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.0.0b" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.0.1" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.0.1b" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.0.2" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.0.2b" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.0.3" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.0.3b" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.0.4" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.0.4b" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.1.0" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.1.0b" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.1.1" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.1.1b" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.1.2" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.1.2b" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.2.0" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.2.0b" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.2.1" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.2.1b" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.2.2" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.2.2b" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.0" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.0.0b" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.0.1" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.0.2" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.0.3" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.0.4" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.0.5" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.1" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.1.1" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.1.2" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "5.0" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "5.0.1" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "5.0.2" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "5.0.4" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "5.0.5" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "5.0.6" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "5.1" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "5.1.1" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "5.1.2" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "5.1.3" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "5.1.4" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "5.1.5" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "5.1.6" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "5.1.7" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "6.0" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "6.0.1" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "6.0.2" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "6.0.3" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "6.0.4" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "6.0.5" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "6.1" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "6.1.1" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "6.1.2" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "6.1.3" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "6.1.4" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "6.1.5" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "6.2.1" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "6.2.4" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "6.2.5" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "6.2.6" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "6.2.8" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "7.0" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "7.0.1" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "7.0.2" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "7.0.3" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "7.0.4" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "7.0.5" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "7.1" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "7.1.1" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "7.1.4" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "7.1.5" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "7.1.6" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "7.1.8" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "8.0" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "8.0.1" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "8.0.4" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "8.0.5" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "8.0.6" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "8.0.8" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "9.0.1" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "9.0.2" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "9.0.3" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "9.1" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "9.1.1" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "9.1.3" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "10.0.0" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "10.0.3" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "10.1" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "10.1.1" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "10.1.2" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "11.0" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "11.0.1" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "11.0.2" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "11.0.3" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "11.1" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "11.1.1" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "11.1.2" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "12" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "12.0" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "12.0.1" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "12.0.2" }, { "model": "safari", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "12.0.3" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "1.0.0" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "1.0.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "1.0.2" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "1.1.0" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "1.1.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "1.1.2" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "1.1.3" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "1.1.4" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "1.1.5" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "2.0" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "2.0.0" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "2.0.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "2.0.2" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "2.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "2.1.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "2.2" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "2.2.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.0" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.0.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.1.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.1.2" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.1.3" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.2" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.2.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.2.2" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.0" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.0.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.0.2" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.2.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.2.5" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.2.6" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.2.7" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.2.8" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.2.9" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.2.10" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.3.0" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.3.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.3.2" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.3.3" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.3.4" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.3.5" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "5.0" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "5.0.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "5.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "5.1.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "6.0" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "6.0.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "6.0.2" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "6.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "6.1.2" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "6.1.3" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "6.1.4" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "6.1.5" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "6.1.6" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "7.0" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "7.0.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "7.0.2" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "7.0.3" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "7.0.4" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "7.0.5" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "7.0.6" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "7.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "7.1.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "7.1.2" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "8.0" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "8.0.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "8.0.2" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "8.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "8.1.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "8.1.2" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "8.1.3" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "8.2" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "8.3" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "8.4" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "8.4.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "9.0" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "9.0.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "9.0.2" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "9.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "9.2" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "9.2.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "9.3" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "9.3.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "9.3.2" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "9.3.3" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "9.3.4" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "9.3.5" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "9.3.6" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "10.0" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "10.0.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "10.0.2" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "10.0.3" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "10.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "10.1.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "10.2" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "10.2.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "10.3" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "10.3.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "10.3.2" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "10.3.3" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "10.3.4" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "11" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "11.0" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "11.0.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "11.0.2" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "11.0.3" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "11.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "11.1.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "11.1.2" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "11.2" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "11.2.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "11.2.2" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "11.2.5" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "11.2.6" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "11.3" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "11.3.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "11.4" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "11.4.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "12.0" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "12.0.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "12.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "12.1.1" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "12.1.2" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "12.1.3" }, { "model": "iphone os", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "12.1.4" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "1.0.0" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "1.1.0" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "2.0.0" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "2.0.1" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "2.0.2" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "2.1.0" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "2.2.0" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "2.3.0" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "2.3.1" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "2.4.0" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.0.0" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.0.1" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.0.2" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.1.0" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.1.1" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.2.0" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.2.1" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.2.2" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.3.0" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.4.0" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.4.2" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.4.3" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.4.4" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "5.0.0" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "5.0.1" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "5.0.2" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "5.1.0" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "5.1.1" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "5.2.0" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "6.0" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "6.0.1" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "6.0.2" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "6.1" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "6.1.1" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "6.1.2" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "6.2" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "6.2.1" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "7.0" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "7.0.1" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "7.0.2" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "7.0.3" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "7.1" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "9.0" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "9.0.1" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "9.1" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "9.1.1" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "9.2" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "9.2.1" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "9.2.2" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "10.0" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "10.0.1" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "10.1" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "10.1.1" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "10.2" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "10.2.1" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "10.2.2" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "11" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "11.0" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "11.1" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "11.2" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "11.2.1" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "11.2.6" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "11.3" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "11.4.1" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "12" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "12.0.1" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "12.1" }, { "model": "tvos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "12.1.1" }, { "model": "watchos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "1.0" }, { "model": "watchos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "1.0.1" }, { "model": "watchos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "2.0" }, { "model": "watchos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "2.0.1" }, { "model": "watchos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "2.1" }, { "model": "watchos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "2.2" }, { "model": "watchos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "2.2.0" }, { "model": "watchos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "2.2.1" }, { "model": "watchos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "2.2.2" }, { "model": "watchos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.0" }, { "model": "watchos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.1" }, { "model": "watchos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.1.1" }, { "model": "watchos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.1.3" }, { "model": "watchos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.2" }, { "model": "watchos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.2.2" }, { "model": "watchos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "3.2.3" }, { "model": "watchos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4" }, { "model": "watchos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.0" }, { "model": "watchos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.0.1" }, { "model": "watchos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.1" }, { "model": "watchos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.2.3" }, { "model": "watchos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.3" }, { "model": "watchos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.3.1" }, { "model": "watchos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "4.3.2" }, { "model": "watchos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "5.0" }, { "model": "watchos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "5.0.1" }, { "model": "watchos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "5.1" }, { "model": "watchos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "5.1.1" }, { "model": "watchos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "5.1.2" }, { "model": "watchos", "scope": "eq", "trust": 0.1, "vendor": "apple", "version": "5.1.3" } ], "sources": [ { "db": "VULMON", "id": "CVE-2019-7292" }, { "db": "JVNDB", "id": "JVNDB-2019-016879" }, { "db": "NVD", "id": "CVE-2019-7292" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*", "cpe_name": [], "versionEndExcluding": "7.11", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*", "cpe_name": [], "versionEndExcluding": "12.9.4", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "12.1", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "12.2", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "12.2", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "5.2", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-7292" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Apple,WebKitGTK+ Team", "sources": [ { "db": "CNNVD", "id": "CNNVD-201903-1014" } ], "trust": 0.6 }, "cve": "CVE-2019-7292", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": true, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.3, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2019-7292", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-158727", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 6.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2019-7292", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-7292", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201903-1014", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-158727", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2019-7292", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-158727" }, { "db": "VULMON", "id": "CVE-2019-7292" }, { "db": "JVNDB", "id": "JVNDB-2019-016879" }, { "db": "CNNVD", "id": "CNNVD-201903-1014" }, { "db": "NVD", "id": "CVE-2019-7292" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A validation issue was addressed with improved logic. This issue is fixed in iOS 12.2, tvOS 12.2, watchOS 5.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may result in the disclosure of process memory. iCloud , iTunes , Safari Multiple Apple products contain vulnerabilities related to input validation.Information may be obtained. Apple Safari could allow a remote malicious user to obtain sensitive information, caused by a validation issue in the WebKit component. By persuading a victim to visit a specially-crafted Web site, a remote attacker could exploit this vulnerability to obtain sensitive information. \nCVE-2019-8546: ChiYuan Chang\n\nPasscode\nAvailable for: Apple Watch Series 1 and later\nImpact: A partially entered passcode may not clear when the device\ngoes to sleep\nDescription: An issue existed where partially entered passcodes may\nnot clear when the device went to sleep. This issue was addressed by\nclearing the passcode when a locked device sleeps. \n\nAlternatively, on your watch, select \"My Watch \u003e General \u003e About\". -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\nAPPLE-SA-2019-3-25-1 iOS 12.2\n\niOS 12.2 is now available and addresses the following:\n\nCFString\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: Processing a maliciously crafted string may lead to a denial\nof service\nDescription: A validation issue was addressed with improved logic. \nCVE-2019-8516: SWIPS Team of Frifee Inc. \n\nconfigd\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: A malicious application may be able to elevate privileges\nDescription: A memory initialization issue was addressed with\nimproved memory handling. \nCVE-2019-8552: Mohamed Ghannam (@_simo36)\n\nContacts\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: A malicious application may be able to elevate privileges\nDescription: A buffer overflow issue was addressed with improved\nmemory handling. \nCVE-2019-8511: an anonymous researcher\n\nCoreCrypto\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: A malicious application may be able to elevate privileges\nDescription: A buffer overflow was addressed with improved bounds\nchecking. \nCVE-2019-8542: an anonymous researcher\n\nExchange ActiveSync\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: A user may authorize an enterprise administrator to remotely\nwipe their device without appropriate disclosure\nDescription: This issue was addressed with improved transparency. \nCVE-2019-8512: an anonymous researcher, an anonymous researcher\n\nFaceTime\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: A user\u0027s video may not be paused in a FaceTime call if they\nexit the FaceTime app while the call is ringing\nDescription: An issue existed in the pausing of FaceTime video. \nCVE-2019-8550: Lauren Guzniczak of Keystone Academy\n\nFeedback Assistant\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: A malicious application may be able to gain root privileges\nDescription: A race condition was addressed with additional\nvalidation. \nCVE-2019-8565: CodeColorist of Ant-Financial LightYear Labs\n\nFeedback Assistant\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: A malicious application may be able to overwrite arbitrary\nfiles\nDescription: This issue was addressed with improved checks. \nCVE-2019-8521: CodeColorist of Ant-Financial LightYear Labs\n\nfile\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: Processing a maliciously crafted file might disclose user\ninformation\nDescription: An out-of-bounds read was addressed with improved bounds\nchecking. \nCVE-2019-6237: an anonymous researcher\n\nGeoServices\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: Clicking a malicious SMS link may lead to arbitrary code\nexecution\nDescription: A memory corruption issue was addressed with improved\nvalidation. \nCVE-2019-8553: an anonymous researcher\n\niAP\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: A malicious application may be able to elevate privileges\nDescription: A buffer overflow was addressed with improved bounds\nchecking. \nCVE-2019-8542: an anonymous researcher\n\nIOHIDFamily\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: A local user may be able to cause unexpected system\ntermination or read kernel memory\nDescription: A memory corruption issue was addressed with improved\nstate management. \nCVE-2019-8545: Adam Donenfeld (@doadam) of the Zimperium zLabs Team\n\nIOKit\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: A local user may be able to read kernel memory\nDescription: A memory initialization issue was addressed with\nimproved memory handling. \nCVE-2019-8504: an anonymous researcher\n\nIOKit SCSI\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: An application may be able to execute arbitrary code with\nkernel privileges\nDescription: A memory corruption issue was addressed with improved\ninput validation. \nCVE-2019-8529: Juwei Lin (@panicaII) of Trend Micro\n\nKernel\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: A remote attacker may be able to cause unexpected system\ntermination or corrupt kernel memory\nDescription: A buffer overflow was addressed with improved size\nvalidation. \nCVE-2019-8527: Ned Williamson of Google and derrek (@derrekr6)\n\nKernel\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: An application may be able to gain elevated privileges\nDescription: A logic issue was addressed with improved state\nmanagement. \nCVE-2019-8514: Samuel Gro\u00df of Google Project Zero\n\nKernel\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: A malicious application may be able to determine kernel\nmemory layout\nDescription: A memory initialization issue was addressed with\nimproved memory handling. \nCVE-2019-8540: Weibo Wang (@ma1fan) of Qihoo 360 Nirvan Team\n\nKernel\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: A local user may be able to read kernel memory\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2019-7293: Ned Williamson of Google\n\nKernel\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: A malicious application may be able to determine kernel\nmemory layout\nDescription: An out-of-bounds read issue existed that led to the\ndisclosure of kernel memory. \nCVE-2019-6207: Weibo Wang of Qihoo 360 Nirvan Team (@ma1fan)\nCVE-2019-8510: Stefan Esser of Antid0te UG\n\nMail\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: Processing a maliciously crafted mail message may lead to\nS/MIME signature spoofing\nDescription: This issue was addressed with improved checks. \nCVE-2019-7284: Damian Poddebniak of M\u00fcnster University of Applied\nSciences\n\nMessages\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: A local user may be able to view sensitive user information\nDescription: An access issue was addressed with additional sandbox\nrestrictions. \nCVE-2019-8546: ChiYuan Chang\n\nPower Management\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: A malicious application may be able to execute arbitrary code\nwith system privileges\nDescription: Multiple input validation issues existed in MIG\ngenerated code. \nCVE-2019-8549: Mohamed Ghannam (@_simo36) of SSD Secure Disclosure\n(ssd-disclosure.com)\n\nPrivacy\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: A malicious app may be able to track users between installs\nDescription: A privacy issue existed in motion sensor calibration. \nCVE-2019-8541: Stan (Jiexin) Zhang and Alastair R. Beresford of the\nUniversity of Cambridge, Ian Sheret of Polymath Insight Limited\n\nReplayKit\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: A malicious application may be able to access the microphone\nwithout indication to the user\nDescription: An API issue existed in the handling of microphone data. \nCVE-2019-8566: an anonymous researcher\n\nSafari\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: A website may be able to access sensor information without\nuser consent\nDescription: A permissions issue existed in the handling of motion\nand orientation data. \nCVE-2019-8554: an anonymous researcher\n\nSafari Reader\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: Enabling the Safari Reader feature on a maliciously crafted\nwebpage may lead to universal cross site scripting\nDescription: A logic issue was addressed with improved validation. \nCVE-2019-6204: Ryan Pickren (ryanpickren.com)\nCVE-2019-8505: Ryan Pickren (ryanpickren.com)\n\nSiri\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: A malicious application may be able to initiate a Dictation\nrequest without user authorization\nDescription: An API issue existed in the handling of dictation\nrequests. \nCVE-2019-8502: Luke Deshotels of North Carolina State University,\nJordan Beichler of North Carolina State University, William Enck of\nNorth Carolina State University, Costin Caraba\u0219 of University\nPOLITEHNICA of Bucharest, and R\u0103zvan Deaconescu of University\nPOLITEHNICA of Bucharest\n\nTrueTypeScaler\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: Processing a maliciously crafted font may result in the\ndisclosure of process memory\nDescription: An out-of-bounds read was addressed with improved bounds\nchecking. \nCVE-2019-8517: riusksk of VulWar Corp working with Trend Micro Zero\nDay Initiative\n\nWebKit\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: Processing maliciously crafted web content may lead to\nuniversal cross site scripting\nDescription: A logic issue was addressed with improved validation. \nCVE-2019-8551: Ryan Pickren (ryanpickren.com)\n\nWebKit\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: Processing maliciously crafted web content may lead to\narbitrary code execution\nDescription: A memory corruption issue was addressed with improved\nstate management. \nCVE-2019-8535: Zhiyang Zeng (@Wester) of Tencent Blade Team\n\nWebKit\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: Processing maliciously crafted web content may lead to\narbitrary code execution\nDescription: Multiple memory corruption issues were addressed with\nimproved memory handling. Geshev working with Trend Micro Zero Day Initiative\nCVE-2019-8558: Samuel Gro\u00df of Google Project Zero\nCVE-2019-8559: Apple\nCVE-2019-8563: Apple\n\nWebKit\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: A sandboxed process may be able to circumvent sandbox\nrestrictions\nDescription: A memory corruption issue was addressed with improved\nvalidation. \nCVE-2019-8562: Wen Xu of SSLab at Georgia Tech and Hanqing Zhao of\nChaitin Security Research Lab\n\nWebKit\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: A website may be able to access the microphone without the\nmicrophone use indicator being shown\nDescription: A consistency issue was addressed with improved state\nhandling. \nCVE-2019-6222: Denis Markov of Resonance Software\n\nWebKit\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: Processing maliciously crafted web content may lead to\narbitrary code execution\nDescription: A memory corruption issue was addressed with improved\nmemory handling. \nCVE-2019-8536: Apple\nCVE-2019-8544: an anonymous researcher\n\nWebKit\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: Processing maliciously crafted web content may disclose\nsensitive user information\nDescription: A cross-origin issue existed with the fetch API. \nCVE-2019-8515: James Lee (@Windowsrcer)\n\nWebKit\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: Processing maliciously crafted web content may lead to\narbitrary code execution\nDescription: A use after free issue was addressed with improved\nmemory management. \nCVE-2019-7285: dwfault working at ADLab of Venustech\nCVE-2019-8556: Apple\n\nWebKit\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: Processing maliciously crafted web content may lead to\narbitrary code execution\nDescription: A type confusion issue was addressed with improved\nmemory handling. \nCVE-2019-8506: Samuel Gro\u00df of Google Project Zero\n\nWebKit\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: A malicious website may be able to execute scripts in the\ncontext of another website\nDescription: A logic issue was addressed with improved validation. \nCVE-2019-7292: Zhunki and Zhiyi Zhang of 360 ESG Codesafe Team\n\nWi-Fi\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: A device may be passively tracked by its WiFi MAC address\nDescription: A user privacy issue was addressed by removing the\nbroadcast MAC address. \nCVE-2019-8567: David Kreitschmann and Milan Stute of Secure Mobile\nNetworking Lab at Technische Universit\u00e4t Darmstadt\n\nXPC\nAvailable for: iPhone 5s and later, iPad Air and later, and iPod\ntouch 6th generation\nImpact: A malicious application may be able to overwrite arbitrary\nfiles\nDescription: This issue was addressed with improved checks. \nCVE-2019-8530: CodeColorist of Ant-Financial LightYear Labs\n\nAdditional recognition\n\nBooks\nWe would like to acknowledge Yi\u011fit Can YILMAZ (@yilmazcanyigit) for\ntheir assistance. \n\nCalendar\nWe would like to acknowledge Peter Hempsall of 104days.com, Sascha\nMogler of mogler.com, and an anonymous researcher for their\nassistance. \n\nQuick Look\nWe would like to acknowledge Yi\u011fit Can YILMAZ (@yilmazcanyigit) for\ntheir assistance. \n\nSafari\nWe would like to acknowledge Nikhil Mittal (@c0d3G33k) of Payatu Labs\n(payatu.com) for their assistance. \n\nScreen Time\nWe would like to acknowledge Brandon Moore (@Brandonsecurity) for\ntheir assistance. \n\nWebKit\nWe would like to acknowledge Andrey Kovalev of Yandex Security Team\nfor their assistance. \n\nInstallation note:\n\nThis update is available through iTunes and Software Update on your\niOS device, and will not appear in your computer\u0027s Software Update\napplication, or in the Apple Downloads site. Make sure you have an\nInternet connection and have installed the latest version of iTunes\nfrom https://www.apple.com/itunes/\n\niTunes and Software Update on the device will automatically check\nApple\u0027s update server on its weekly schedule. When an update is\ndetected, it is downloaded and the option to be installed is\npresented to the user when the iOS device is docked. We recommend\napplying the update immediately if possible. Selecting Don\u0027t Install\nwill present the option the next time you connect your iOS device. \n\nThe automatic update process may take up to a week depending on the\nday that iTunes or the device checks for updates. You may manually\nobtain the update via the Check for Updates button within iTunes, or\nthe Software Update on your device. \n\nTo check that the iPhone, iPod touch, or iPad has been updated:\n\n* Navigate to Settings\n* Select General\n* Select About. The version after applying this update\nwill be \"iOS 12.2\". \n\nInformation will also be posted to the Apple Security Updates\nweb site: https://support.apple.com/kb/HT201222\n\nThis message is signed with Apple\u0027s Product Security PGP key,\nand details are available at:\nhttps://www.apple.com/support/security/pgp/\n-----BEGIN PGP SIGNATURE-----\n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\nSjGjz4yWGw+2VFkNkFbbA8OKSZYk4ck2WdWgf6s0Vgc=\n=VAWG\n-----END PGP SIGNATURE-----=\n. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 201909-05\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n https://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n Title: WebkitGTK+: Multiple vulnerabilities\n Date: September 06, 2019\n Bugs: #683234, #686216, #693122\n ID: 201909-05\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in WebkitGTK+, the worst of\nwhich could result in the arbitrary execution of code. \n\nBackground\n==========\n\nWebKitGTK+ is a full-featured port of the WebKit rendering engine,\nsuitable for projects requiring any kind of web integration, from\nhybrid HTML/CSS applications to full-fledged web browsers. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 net-libs/webkit-gtk \u003c 2.24.4 \u003e= 2.24.4\n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in WebkitGTK+. Please\nreview the CVE identifiers referenced below for details. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll WebkitGTK+ users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=net-libs/webkit-gtk-2.24.4\"\n\nReferences\n==========\n\n[ 1 ] CVE-2019-11070\n https://nvd.nist.gov/vuln/detail/CVE-2019-11070\n[ 2 ] CVE-2019-6201\n https://nvd.nist.gov/vuln/detail/CVE-2019-6201\n[ 3 ] CVE-2019-6251\n https://nvd.nist.gov/vuln/detail/CVE-2019-6251\n[ 4 ] CVE-2019-7285\n https://nvd.nist.gov/vuln/detail/CVE-2019-7285\n[ 5 ] CVE-2019-7292\n https://nvd.nist.gov/vuln/detail/CVE-2019-7292\n[ 6 ] CVE-2019-8503\n https://nvd.nist.gov/vuln/detail/CVE-2019-8503\n[ 7 ] CVE-2019-8506\n https://nvd.nist.gov/vuln/detail/CVE-2019-8506\n[ 8 ] CVE-2019-8515\n https://nvd.nist.gov/vuln/detail/CVE-2019-8515\n[ 9 ] CVE-2019-8518\n https://nvd.nist.gov/vuln/detail/CVE-2019-8518\n[ 10 ] CVE-2019-8523\n https://nvd.nist.gov/vuln/detail/CVE-2019-8523\n[ 11 ] CVE-2019-8524\n https://nvd.nist.gov/vuln/detail/CVE-2019-8524\n[ 12 ] CVE-2019-8535\n https://nvd.nist.gov/vuln/detail/CVE-2019-8535\n[ 13 ] CVE-2019-8536\n https://nvd.nist.gov/vuln/detail/CVE-2019-8536\n[ 14 ] CVE-2019-8544\n https://nvd.nist.gov/vuln/detail/CVE-2019-8544\n[ 15 ] CVE-2019-8551\n https://nvd.nist.gov/vuln/detail/CVE-2019-8551\n[ 16 ] CVE-2019-8558\n https://nvd.nist.gov/vuln/detail/CVE-2019-8558\n[ 17 ] CVE-2019-8559\n https://nvd.nist.gov/vuln/detail/CVE-2019-8559\n[ 18 ] CVE-2019-8563\n https://nvd.nist.gov/vuln/detail/CVE-2019-8563\n[ 19 ] CVE-2019-8595\n https://nvd.nist.gov/vuln/detail/CVE-2019-8595\n[ 20 ] CVE-2019-8607\n https://nvd.nist.gov/vuln/detail/CVE-2019-8607\n[ 21 ] CVE-2019-8615\n https://nvd.nist.gov/vuln/detail/CVE-2019-8615\n[ 22 ] CVE-2019-8644\n https://nvd.nist.gov/vuln/detail/CVE-2019-8644\n[ 23 ] CVE-2019-8644\n https://nvd.nist.gov/vuln/detail/CVE-2019-8644\n[ 24 ] CVE-2019-8649\n https://nvd.nist.gov/vuln/detail/CVE-2019-8649\n[ 25 ] CVE-2019-8649\n https://nvd.nist.gov/vuln/detail/CVE-2019-8649\n[ 26 ] CVE-2019-8658\n https://nvd.nist.gov/vuln/detail/CVE-2019-8658\n[ 27 ] CVE-2019-8658\n https://nvd.nist.gov/vuln/detail/CVE-2019-8658\n[ 28 ] CVE-2019-8666\n https://nvd.nist.gov/vuln/detail/CVE-2019-8666\n[ 29 ] CVE-2019-8666\n https://nvd.nist.gov/vuln/detail/CVE-2019-8666\n[ 30 ] CVE-2019-8669\n https://nvd.nist.gov/vuln/detail/CVE-2019-8669\n[ 31 ] CVE-2019-8669\n https://nvd.nist.gov/vuln/detail/CVE-2019-8669\n[ 32 ] CVE-2019-8671\n https://nvd.nist.gov/vuln/detail/CVE-2019-8671\n[ 33 ] CVE-2019-8671\n https://nvd.nist.gov/vuln/detail/CVE-2019-8671\n[ 34 ] CVE-2019-8672\n https://nvd.nist.gov/vuln/detail/CVE-2019-8672\n[ 35 ] CVE-2019-8672\n https://nvd.nist.gov/vuln/detail/CVE-2019-8672\n[ 36 ] CVE-2019-8673\n https://nvd.nist.gov/vuln/detail/CVE-2019-8673\n[ 37 ] CVE-2019-8673\n https://nvd.nist.gov/vuln/detail/CVE-2019-8673\n[ 38 ] CVE-2019-8676\n https://nvd.nist.gov/vuln/detail/CVE-2019-8676\n[ 39 ] CVE-2019-8676\n https://nvd.nist.gov/vuln/detail/CVE-2019-8676\n[ 40 ] CVE-2019-8677\n https://nvd.nist.gov/vuln/detail/CVE-2019-8677\n[ 41 ] CVE-2019-8677\n https://nvd.nist.gov/vuln/detail/CVE-2019-8677\n[ 42 ] CVE-2019-8678\n https://nvd.nist.gov/vuln/detail/CVE-2019-8678\n[ 43 ] CVE-2019-8678\n https://nvd.nist.gov/vuln/detail/CVE-2019-8678\n[ 44 ] CVE-2019-8679\n https://nvd.nist.gov/vuln/detail/CVE-2019-8679\n[ 45 ] CVE-2019-8679\n https://nvd.nist.gov/vuln/detail/CVE-2019-8679\n[ 46 ] CVE-2019-8680\n https://nvd.nist.gov/vuln/detail/CVE-2019-8680\n[ 47 ] CVE-2019-8680\n https://nvd.nist.gov/vuln/detail/CVE-2019-8680\n[ 48 ] CVE-2019-8681\n https://nvd.nist.gov/vuln/detail/CVE-2019-8681\n[ 49 ] CVE-2019-8681\n https://nvd.nist.gov/vuln/detail/CVE-2019-8681\n[ 50 ] CVE-2019-8683\n https://nvd.nist.gov/vuln/detail/CVE-2019-8683\n[ 51 ] CVE-2019-8683\n https://nvd.nist.gov/vuln/detail/CVE-2019-8683\n[ 52 ] CVE-2019-8684\n https://nvd.nist.gov/vuln/detail/CVE-2019-8684\n[ 53 ] CVE-2019-8684\n https://nvd.nist.gov/vuln/detail/CVE-2019-8684\n[ 54 ] CVE-2019-8686\n https://nvd.nist.gov/vuln/detail/CVE-2019-8686\n[ 55 ] CVE-2019-8686\n https://nvd.nist.gov/vuln/detail/CVE-2019-8686\n[ 56 ] CVE-2019-8687\n https://nvd.nist.gov/vuln/detail/CVE-2019-8687\n[ 57 ] CVE-2019-8687\n https://nvd.nist.gov/vuln/detail/CVE-2019-8687\n[ 58 ] CVE-2019-8688\n https://nvd.nist.gov/vuln/detail/CVE-2019-8688\n[ 59 ] CVE-2019-8688\n https://nvd.nist.gov/vuln/detail/CVE-2019-8688\n[ 60 ] CVE-2019-8689\n https://nvd.nist.gov/vuln/detail/CVE-2019-8689\n[ 61 ] CVE-2019-8689\n https://nvd.nist.gov/vuln/detail/CVE-2019-8689\n[ 62 ] CVE-2019-8690\n https://nvd.nist.gov/vuln/detail/CVE-2019-8690\n[ 63 ] CVE-2019-8690\n https://nvd.nist.gov/vuln/detail/CVE-2019-8690\n[ 64 ] WSA-2019-0002\n https://webkitgtk.org/security/WSA-2019-0002.html\n[ 65 ] WSA-2019-0004\n https://webkitgtk.org/security/WSA-2019-0004.html\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n https://security.gentoo.org/glsa/201909-05\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2019 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttps://creativecommons.org/licenses/by-sa/2.5\n. \n\nInstallation note:\n\nSafari 12.1 may be obtained from the Mac App Store. ------------------------------------------------------------------------\nWebKitGTK and WPE WebKit Security Advisory WSA-2019-0002\n------------------------------------------------------------------------\n\nDate reported : April 10, 2019\nAdvisory ID : WSA-2019-0002\nWebKitGTK Advisory URL : \nhttps://webkitgtk.org/security/WSA-2019-0002.html\nWPE WebKit Advisory URL : \nhttps://wpewebkit.org/security/WSA-2019-0002.html\nCVE identifiers : CVE-2019-6201, CVE-2019-6251, CVE-2019-7285,\n CVE-2019-7292, CVE-2019-8503, CVE-2019-8506,\n CVE-2019-8515, CVE-2019-8518, CVE-2019-8523,\n CVE-2019-8524, CVE-2019-8535, CVE-2019-8536,\n CVE-2019-8544, CVE-2019-8551, CVE-2019-8558,\n CVE-2019-8559, CVE-2019-8563, CVE-2019-11070. \n\nSeveral vulnerabilities were discovered in WebKitGTK and WPE WebKit. \n\nCVE-2019-6201\n Versions affected: WebKitGTK before 2.22.6 and WPE WebKit before\n 2.22.4. \n Credit to dwfault working with ADLab of Venustech. \n\nCVE-2019-6251\n Versions affected: WebKitGTK and WPE WebKit before 2.24.1. \n Credit to Dhiraj. \n WebKitGTK and WPE WebKit were vulnerable to a URI spoofing attack\n similar to the CVE-2018-8383 issue in Microsoft Edge. \n\nCVE-2019-7285\n Versions affected: WebKitGTK before 2.22.6 and WPE WebKit before\n 2.22.4. \n Credit to dwfault working at ADLab of Venustech. \n\nCVE-2019-7292\n Versions affected: WebKitGTK before 2.22.6 and WPE WebKit before\n 2.22.4. \n Credit to Zhunki and Zhiyi Zhang of 360 ESG Codesafe Team. \n\nCVE-2019-8503\n Versions affected: WebKitGTK before 2.22.6 and WPE WebKit before\n 2.22.4. \n Credit to Linus S\\xe4rud of Detectify. \n A malicious website may be able to execute scripts in the context of\n another website. \n\nCVE-2019-8506\n Versions affected: WebKitGTK and WPE WebKit before 2.24.0. \n Credit to Samuel Gro\\xdf of Google Project Zero. \n\nCVE-2019-8515\n Versions affected: WebKitGTK before 2.22.6 and WPE WebKit before\n 2.22.4. \n Credit to James Lee, @Windowsrcer. A cross-origin issue existed with the fetch API. \n\nCVE-2019-8518\n Versions affected: WebKitGTK before 2.22.7 and WPE WebKit before\n 2.22.5. \n Credit to Samuel Gro\\xdf of Google Project Zero. \n\nCVE-2019-8523\n Versions affected: WebKitGTK before 2.22.7 and WPE WebKit before\n 2.22.5. \n Credit to Apple. \n\nCVE-2019-8524\n Versions affected: WebKitGTK and WPE WebKit before 2.24.0. \n Credit to G. Geshev working with Trend Micro Zero Day Initiative. \n\nCVE-2019-8535\n Versions affected: WebKitGTK and WPE WebKit before 2.24.0. \n Credit to Zhiyang Zeng, @Wester, of Tencent Blade Team. \n\nCVE-2019-8536\n Versions affected: WebKitGTK and WPE WebKit before 2.24.0. \n Credit to Apple. \n\nCVE-2019-8544\n Versions affected: WebKitGTK and WPE WebKit before 2.24.0. \n Credit to an anonymous researcher. \n\nCVE-2019-8551\n Versions affected: WebKitGTK and WPE WebKit before 2.24.0. \n Credit to Ryan Pickren, ryanpickren.com. \n\nCVE-2019-8558\n Versions affected: WebKitGTK and WPE WebKit before 2.24.0. \n Credit to Samuel Gro\\xdf of Google Project Zero. \n\nCVE-2019-8559\n Versions affected: WebKitGTK and WPE WebKit before 2.24.0. \n Credit to Apple. \n\nCVE-2019-8563\n Versions affected: WebKitGTK and WPE WebKit before 2.24.0. \n Credit to Apple. \n\nCVE-2019-11070\n Versions affected: WebKitGTK and WPE WebKit before 2.24.1. \n Credit to Igalia. \n WebKitGTK and WPE WebKit failed to properly apply configured HTTP\n proxy settings when downloading livestream video (HLS, DASH, or\n Smooth Streaming), an error resulting in deanonymization. This issue\n was corrected by changing the way livestreams are downloaded. \n\n\nWe recommend updating to the latest stable versions of WebKitGTK and WPE\nWebKit. It is the best way to ensure that you are running safe versions\nof WebKit. Please check our websites for information about the latest\nstable releases. \n\nFurther information about WebKitGTK and WPE WebKit security advisories\ncan be found at: https://webkitgtk.org/security.html or\nhttps://wpewebkit.org/security/. \n\nThe WebKitGTK and WPE WebKit team,\nApril 10, 2019\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2019-7292" }, { "db": "JVNDB", "id": "JVNDB-2019-016879" }, { "db": "VULHUB", "id": "VHN-158727" }, { "db": "VULMON", "id": "CVE-2019-7292" }, { "db": "PACKETSTORM", "id": "152277" }, { "db": "PACKETSTORM", "id": "152227" }, { "db": "PACKETSTORM", "id": "154389" }, { "db": "PACKETSTORM", "id": "152224" }, { "db": "PACKETSTORM", "id": "152226" }, { "db": "PACKETSTORM", "id": "152225" }, { "db": "PACKETSTORM", "id": "152485" } ], "trust": 2.43 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-7292", "trust": 4.1 }, { "db": "JVNDB", "id": "JVNDB-2019-016879", "trust": 0.8 }, { "db": "PACKETSTORM", "id": "152277", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "152485", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "152228", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.0991", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.1032", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201903-1014", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-158727", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2019-7292", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "152227", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "154389", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "152224", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "152226", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "152225", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-158727" }, { "db": "VULMON", "id": "CVE-2019-7292" }, { "db": "JVNDB", "id": "JVNDB-2019-016879" }, { "db": "PACKETSTORM", "id": "152277" }, { "db": "PACKETSTORM", "id": "152227" }, { "db": "PACKETSTORM", "id": "154389" }, { "db": "PACKETSTORM", "id": "152224" }, { "db": "PACKETSTORM", "id": "152226" }, { "db": "PACKETSTORM", "id": "152225" }, { "db": "PACKETSTORM", "id": "152485" }, { "db": "CNNVD", "id": "CNNVD-201903-1014" }, { "db": "NVD", "id": "CVE-2019-7292" } ] }, "id": "VAR-201912-0457", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-158727" } ], "trust": 0.01 }, "last_update_date": "2024-07-23T21:43:28.933000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HT209604 Apple\u00a0 Security update", "trust": 0.8, "url": "https://support.apple.com/en-us/ht209599" }, { "title": "Multiple Apple product WebKit Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=90457" }, { "title": "Apple: iTunes 12.9.4 for Windows", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories\u0026qid=0e74c4754b41f986f23a36b9acc63c5c" }, { "title": "Apple: Safari 12.1", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories\u0026qid=686247978a3dcc9a7a5321d1cd532d44" }, { "title": "Apple: iCloud for Windows 7.11", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories\u0026qid=318b615f18d0a41dc42000c54bce66cc" }, { "title": "Apple: watchOS 5.2", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=apple_security_advisories\u0026qid=2535ab738191c2105f7d40d8c90ed298" }, { "title": "Superion", "trust": 0.1, "url": "https://github.com/zhunki/superion " }, { "title": "DRL-Guided-Fuzzing", "trust": 0.1, "url": "https://github.com/tangsongtju/drl-guided-fuzzing " } ], "sources": [ { "db": "VULMON", "id": "CVE-2019-7292" }, { "db": "JVNDB", "id": "JVNDB-2019-016879" }, { "db": "CNNVD", "id": "CNNVD-201903-1014" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-158727" }, { "db": "JVNDB", "id": "JVNDB-2019-016879" }, { "db": "NVD", "id": "CVE-2019-7292" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-7292" }, { "trust": 1.8, "url": "https://support.apple.com/ht209599" }, { "trust": 1.8, "url": "https://support.apple.com/ht209601" }, { "trust": 1.8, "url": "https://support.apple.com/ht209602" }, { "trust": 1.8, "url": "https://support.apple.com/ht209603" }, { "trust": 1.8, "url": "https://support.apple.com/ht209604" }, { "trust": 1.8, "url": "https://support.apple.com/ht209605" }, { "trust": 0.7, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8518" }, { "trust": 0.7, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8506" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8544" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8536" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8524" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-6201" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-7285" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8523" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8503" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8515" }, { "trust": 0.6, "url": "https://support.apple.com/en-au/ht209599" }, { "trust": 0.6, "url": "https://support.apple.com/en-au/ht209602" }, { "trust": 0.6, "url": "https://support.apple.com/en-us/ht209603" }, { "trust": 0.6, "url": "https://support.apple.com/en-us/ht209602" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/152228/apple-security-advisory-2019-3-25-6.html" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/apple-ios-multiple-vulnerabilities-28854" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/77810" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/77986" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/152277/apple-security-advisory-2019-3-27-1.html" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/152485/webkitgtk-wpe-webkit-uri-spoofing-code-execution.html" }, { "trust": 0.5, "url": "https://support.apple.com/kb/ht201222" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8558" }, { "trust": 0.5, "url": "https://www.apple.com/support/security/pgp/" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8559" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8563" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8535" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8551" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8514" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8502" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8516" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-6237" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8527" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8542" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8517" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-6207" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-7293" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8510" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8511" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8540" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8545" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-7286" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8549" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8505" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-6204" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8530" }, { "trust": 0.2, "url": "https://webkitgtk.org/security/wsa-2019-0002.html" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11070" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-6251" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8562" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8556" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/20.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/158595" }, { "trust": 0.1, "url": "https://support.apple.com/kb/ht204641" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8546" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8553" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8552" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8541" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8548" }, { "trust": 0.1, "url": "https://www.apple.com/itunes/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-7284" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8512" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8521" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8504" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-6222" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8529" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8615" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8669" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8687" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8644" }, { "trust": 0.1, "url": "https://security.gentoo.org/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8680" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8688" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8595" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8607" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8690" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8686" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8671" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8649" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8672" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8658" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8684" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8666" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8683" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8678" }, { "trust": 0.1, "url": "https://webkitgtk.org/security/wsa-2019-0004.html" }, { "trust": 0.1, "url": "https://security.gentoo.org/glsa/201909-05" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8677" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8689" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8676" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8679" }, { "trust": 0.1, "url": "https://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8681" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-8673" }, { "trust": 0.1, "url": "https://www.apple.com/itunes/download/" }, { "trust": 0.1, "url": "https://wpewebkit.org/security/." }, { "trust": 0.1, "url": "https://wpewebkit.org/security/wsa-2019-0002.html" }, { "trust": 0.1, "url": "https://webkitgtk.org/security.html" } ], "sources": [ { "db": "VULHUB", "id": "VHN-158727" }, { "db": "VULMON", "id": "CVE-2019-7292" }, { "db": "JVNDB", "id": "JVNDB-2019-016879" }, { "db": "PACKETSTORM", "id": "152277" }, { "db": "PACKETSTORM", "id": "152227" }, { "db": "PACKETSTORM", "id": "154389" }, { "db": "PACKETSTORM", "id": "152224" }, { "db": "PACKETSTORM", "id": "152226" }, { "db": "PACKETSTORM", "id": "152225" }, { "db": "PACKETSTORM", "id": "152485" }, { "db": "CNNVD", "id": "CNNVD-201903-1014" }, { "db": "NVD", "id": "CVE-2019-7292" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-158727" }, { "db": "VULMON", "id": "CVE-2019-7292" }, { "db": "JVNDB", "id": "JVNDB-2019-016879" }, { "db": "PACKETSTORM", "id": "152277" }, { "db": "PACKETSTORM", "id": "152227" }, { "db": "PACKETSTORM", "id": "154389" }, { "db": "PACKETSTORM", "id": "152224" }, { "db": "PACKETSTORM", "id": "152226" }, { "db": "PACKETSTORM", "id": "152225" }, { "db": "PACKETSTORM", "id": "152485" }, { "db": "CNNVD", "id": "CNNVD-201903-1014" }, { "db": "NVD", "id": "CVE-2019-7292" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-18T00:00:00", "db": "VULHUB", "id": "VHN-158727" }, { "date": "2019-12-18T00:00:00", "db": "VULMON", "id": "CVE-2019-7292" }, { "date": "2024-07-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-016879" }, { "date": "2019-03-28T16:23:02", "db": "PACKETSTORM", "id": "152277" }, { "date": "2019-03-26T14:43:20", "db": "PACKETSTORM", "id": "152227" }, { "date": "2019-09-06T22:21:59", "db": "PACKETSTORM", "id": "154389" }, { "date": "2019-03-26T14:42:21", "db": "PACKETSTORM", "id": "152224" }, { "date": "2019-03-26T14:43:04", "db": "PACKETSTORM", "id": "152226" }, { "date": "2019-03-26T14:42:33", "db": "PACKETSTORM", "id": "152225" }, { "date": "2019-04-11T14:17:55", "db": "PACKETSTORM", "id": "152485" }, { "date": "2019-03-26T00:00:00", "db": "CNNVD", "id": "CNNVD-201903-1014" }, { "date": "2019-12-18T18:15:22.363000", "db": "NVD", "id": "CVE-2019-7292" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-12-31T00:00:00", "db": "VULHUB", "id": "VHN-158727" }, { "date": "2019-12-31T00:00:00", "db": "VULMON", "id": "CVE-2019-7292" }, { "date": "2024-07-19T04:43:00", "db": "JVNDB", "id": "JVNDB-2019-016879" }, { "date": "2021-11-03T00:00:00", "db": "CNNVD", "id": "CNNVD-201903-1014" }, { "date": "2019-12-31T18:14:20.687000", "db": "NVD", "id": "CVE-2019-7292" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201903-1014" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Input validation vulnerability in multiple Apple products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-016879" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201903-1014" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.