lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Date: Fri, 11 Oct 2019 15:48:22 -0700
From: Apple Product Security via Fulldisclosure <fulldisclosure@...lists.org>
To: security-announce@...ts.apple.com
Subject: [FD] APPLE-SA-2019-10-11-1 Swift 5.1.1 for Ubuntu

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

APPLE-SA-2019-10-11-1 Swift 5.1.1 for Ubuntu

Swift 5.1.1 for Ubuntu is now available and addresses the following:

Foundation
Available for: Ubuntu 14.04, 16.04 and 18.04
Impact: Incorrect management of file descriptors in URLSession could
lead to inadvertent data disclosure
Description: This issue was addresses by updating incorrect
URLSession file descriptors management logic to match Swift 5.0.
CVE-2019-8790: Apple

Installation note:

Swift 5.1.1 for Ubuntu may be obtained from
https://swift.org/download/.

Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222 and the Swift
announcements section on the forum:
https://forums.swift.org/c/general-announce

Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222

This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----
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=rm/M
-----END PGP SIGNATURE-----

_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Powered by blists - more mailing lists