[<prev] [next>] [day] [month] [year] [list]
Message-id: <EF3F3BDF-E5DA-4F06-B559-2545FF059F21@lists.apple.com>
Date: Thu, 27 Oct 2016 15:25:10 -0700
From: Apple Product Security <product-security-noreply@...ts.apple.com>
To: security-announce@...ts.apple.com
Subject: [FD] APPLE-SA-2016-10-27-1 Xcode 8.1
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
APPLE-SA-2016-10-27-1 Xcode 8.1
Xcode 8.1 is now available and addresses the following:
IDE Xcode Server
Available for: OS X El Capitan v10.11.5 and later
Impact: A remote attacker may be able to cause unexpected application
termination or arbitrary code execution
Description: Multiple issues existed in Node.js in Xcode Server.
These issues were addressed by updating to Node.js version 4.5.0.
CVE-2016-1669
CVE-2016-0705
CVE-2016-0797
CVE-2016-0702
CVE-2016-2086
CVE-2016-2216
CVE-2015-8027
CVE-2015-3193
CVE-2015-3194
CVE-2015-6764
Xcode 8.1 may be obtained from:
https://developer.apple.com/xcode/downloads/
To check that the Xcode has been updated:
* Select Xcode in the menu bar
* Select About Xcode
* The version after applying this update will be "8.1".
Information will also be posted to the Apple Security Updates
web site:
https://support.apple.com/kb/HT1222
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - https://gpgtools.org
iQIcBAEBCgAGBQJYEn2fAAoJEIOj74w0bLRG7ccQAJ5AI8A5ZcFsSeA0moHmYPjZ
wx879ojf5IyzVO/Hp0aiKfMHDf77X+BJjCmFyFb3IWhO5dRVLv6Md401R52lFMzA
+neRjEIr3HO4daopbRQXEheiMzWNFLPErWl+nYruL+17TvkN7WDL5PkuxTIedsWG
YJyxacejGmNET16xbyBneYPUbJrTl7WKLCZpjgv4lfNgIVfPjulF+t+hKC8gp5Yi
whHL8/+gT2/MXkmv2ACTcewZhKMeHICnja9gquqqv3AGeFqcdW59lpR9A+sEs77W
lZrNQhXZrMDw6K8DVxCHay0Gz7T9MpYwrmSzJYkGtk4xQfWs+G/fppHqj1DzcCXd
EqvpTI5Vmn7AsgDx9anSKGTDMYZ4T6Xw0Q5yIKmHq1bn3dEHxLtxf27efc4JkTlB
wJR3lz2BSdOxUjG8ob2MDRtEO0eikpj7mIkzvuXmfHLvO80eSLqwZdxZucq7rfeK
9Js+JnCs58LtBN3Kc0FWBHq+iyPR7J4FQb3Qg2IdqnoM9NHUISge/sA/baTStYLJ
GlEdi4tpbLLQ6Fb0R1BG/rs3+pVMCQchCqDCmy9IgoF2awY0MS/sczmpa/GSic3k
c6wvL19KQjI820+wUh8m5DzDG/vMdJOJqgGRltk2x+h+g12SFNyTbzpzj/QGV6RI
j631bs8/hm5Y6dVAeRzC
=RFf5
-----END PGP SIGNATURE-----
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists