lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-id: <7657058E-EE4F-4055-B929-0A2E855A6BA1@lists.apple.com>
Date: Mon, 25 Mar 2019 18:57:18 -0400
From: Apple Product Security via Fulldisclosure <fulldisclosure@...lists.org>
To: security-announce@...ts.apple.com
Subject: [FD] APPLE-SA-2019-3-25-7 Xcode 10.2

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

APPLE-SA-2019-3-25-7 Xcode 10.2

Xcode 10.2 is now available and addresses the following:

Kernel
Available for: macOS 10.13.6 or later
Impact: An application may be able to execute arbitrary code with
kernel privileges
Description: A memory corruption issue was addressed with improved
input validation.
CVE-2018-4461: Ian Beer of Google Project Zero

Installation note:

Xcode 10.2 may be obtained from:

https://developer.apple.com/xcode/downloads/

To check that the Xcode has been updated:

* Select Xcode in the menu bar
* Select About Xcode
* The version after applying this update will be "10.2".

Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222

This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----

iQJdBAEBCABHFiEEDNXJVNCJJEAVmJdZeC9tht7TK3EFAlyZPJspHHByb2R1Y3Qt
c2VjdXJpdHktbm9yZXBseUBsaXN0cy5hcHBsZS5jb20ACgkQeC9tht7TK3HjrQ//
ZlUuus0hA3LOUM5PTmYkrOshF3VHp4ROG3lir2gvcQbz0xeRkWD/wJJZhfjBymYd
aQYDbouFVJb9WSTXMPb52hz86haeP7UQ5qEIDv+cTNSZtA2vTM4Jx+5134L5C1Sz
pPVTqu5uel1+F0c9wPH9TV0u4VaRxnE5z9hIPzoQiXHqs9jhYsgtk9OyiUTnMijd
Uqx7yg758Rorpy1IH5C1uuxTA2qvP7lLL4MmuElXJcsCcQvxvYwiSL3c3pwPQYG9
OEm1fiQ/gX08kLH+kKUe5B7OP+OMcpiNcZwvD9IJkQLdWbvU6vyoqTkAAvKX6Y+q
ncnsfZDryP4fwuPTm2q4zt7T9WfPBr3nBdc1VTDHkyX9cXwyJ8oPH5Oo6X6jeUlQ
gpBGUK2RhlmL/jQp/Q7QQ/qWzcR+Hq3WjMkVLbPCrCl8/Vx+ZwNqvoQvSW+Hxd4d
JAJ8tlgRZupyJnfdJxKo8hz7iZKZS2eR1YjwW7GxHeIiLX3TA5rgY/yTYKM/Kxu/
nMwjeymFrtj/CzPQBHRxE/sSx+ly6btFGjEUVrmEBEPpWsOPDEAi4Nd4V9lsFyay
Jp4oFL/OjL+upjOWaE0rFED9NmVgqDSjmoInQpzqg749tYrkQfTzOt4X/+dGCC27
tFwu8BbajKF8aSzguKv3D9oAUwYoH/L1bdZVX2vSWyE=
=gqgW
-----END PGP SIGNATURE-----

_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ