Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2019.4631 Xcode 11.3 11 December 2019 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Xcode Publisher: Apple Operating System: Apple iOS Impact/Access: Execute Arbitrary Code/Commands -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2019-8840 Original Bulletin: https://support.apple.com/kb/HT201222 - --------------------------BEGIN INCLUDED TEXT-------------------- APPLE-SA-2019-12-10-7 Xcode 11.3 Xcode 11.3 is now available and addresses the following: ld64 Available for: macOS Mojave 10.14.4 and later Impact: Compiling with untrusted sources may lead to arbitrary code execution with user privileges Description: An out-of-bounds read was addressed with improved bounds checking. CVE-2019-8840: Pan ZhenPeng (@Peterpan0927) of Qihoo 360 Nirvan Team Additional recognition Clang We would like to acknowledge an anonymous researcher for their assistance. Installation note: Xcode 11.3 may be obtained from: https://developer.apple.com/xcode/downloads/ To check that the Xcode has been updated: * Select Xcode in the menu bar * Select About Xcode * The version after applying this update will be "11.3". Information will also be posted to the Apple Security Updates web site: https://support.apple.com/kb/HT201222 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXfCEnGaOgq3Tt24GAQiafQ//dsAU5SHZX/uWUUP5Xt5x65YsaDV4G6g6 gDCVM2bIlv/BzCXVz7JEbP8tGwg1Xmc+jr4rWQA2Tg0OZ0x4PqBA3gKh8+gtw9Ox AB6MFMkwQxt5pSYAY6ZWUY8bPY2RHtLUljUsCJzN/ZF1Gp3uL5CGxViprZAwSBj7 VmkWM9q6GaigfWlg2Uo9HsfpoyqbfZn0tIG3n6Z2o2V002lvZZzdu3U6CDzP/DRh QAhHD11M9m+KwwtRLffGY0WYQQ+uzZI9ctZ8im35dUdWJU4AKy8BWlWvAme+ym4c M11lVAtfwO4tuVGn9t1fhL4blR5jPMXxjKl0uzK6emiAZCf5c/lMqYr2ILsWZzjq jbAEPRQ8zKdmlC3NNovwr3eIxixmpUGSBZ6U6PuPlHvwI4mSjF1JqO2zXPDxcVt5 p99W33AWsllbK6zkTrKM5f3aRp3CP9d7KHRz+uOkOg0m84aAeTnrYbTg51SOgWDQ BcFHBGxoiV6V/vjlG2Y2j384SevidtotwvcmHKOkEBMfNMnCpeDgAnXC1/fgyNuH MfGP4992bjI3qxfxnTJTw9RBLg5vZei3rUj2P1d5C3LKQOo/XUR8qjJrmTpBh4Gr 67mrr8DT2ZvXWoSr9wrFvbixJ6WGEtYDEJMCH9g7GHD+4rzmx1F6VlacAZUuARfP O4TJwnQ7AOc= =otum -----END PGP SIGNATURE-----