exploit the possibilities

Apple Security Advisory 2021-09-20-4

Apple Security Advisory 2021-09-20-4
Posted Sep 22, 2021
Authored by Apple | Site apple.com

Apple Security Advisory 2021-09-20-4 - Xcode 13 addresses multiple issues in nginx.

tags | advisory
systems | apple
advisories | CVE-2016-0742, CVE-2016-0746, CVE-2016-0747, CVE-2017-7529, CVE-2018-16843, CVE-2018-16844, CVE-2018-16845, CVE-2019-20372
SHA-256 | e298f65735c01199cc9782cb84a35d40ade27a44f1619154f005170a70f23d97

Apple Security Advisory 2021-09-20-4

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

APPLE-SA-2021-09-20-4 Xcode 13

Xcode 13 addresses the following issues. Information about the
security content is also available at
https://support.apple.com/HT212818.

IDE Xcode Server
Available for: macOS Big Sur 11.3 and later
Impact: Multiple issues in nginx
Description: Multiple issues were addressed by updating nginx to
version 1.21.0.
CVE-2016-0742
CVE-2016-0746
CVE-2016-0747
CVE-2017-7529
CVE-2018-16843
CVE-2018-16844
CVE-2018-16845
CVE-2019-20372

Installation note:

Xcode 13 may be obtained from:

https://developer.apple.com/xcode/downloads/

To check that the Xcode has been updated:

* Select Xcode in the menu bar
* Select About Xcode
* The version after applying this update will be "Xcode 13".

Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222

This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/

-----BEGIN PGP SIGNATURE-----
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=4uM6
-----END PGP SIGNATURE-----



Login or Register to add favorites

File Archive:

May 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    0 Files
  • 2
    May 2nd
    15 Files
  • 3
    May 3rd
    19 Files
  • 4
    May 4th
    24 Files
  • 5
    May 5th
    15 Files
  • 6
    May 6th
    14 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    13 Files
  • 10
    May 10th
    7 Files
  • 11
    May 11th
    99 Files
  • 12
    May 12th
    45 Files
  • 13
    May 13th
    7 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    16 Files
  • 17
    May 17th
    26 Files
  • 18
    May 18th
    4 Files
  • 19
    May 19th
    17 Files
  • 20
    May 20th
    2 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close