-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 APPLE-SA-2013-09-18-3 Xcode 5.0 Xcode 5.0 is now available and addresses the following: Git Available for: OS X Mountain Lion v10.8.4 or later Impact: An attacker with a privileged network position may intercept user credentials or other sensitive information Description: When using the imap-send command, git did not verify that the server hostname matched a domain name in the X.509 certificate, which allowed a man-in-the-middle attacker to spoof SSL servers via an arbitrary valid certificate. This issue was addressed by updating git to version 1.8.3.1. CVE-ID CVE-2013-0308 Xcode 5.0 is also available from the App Store. It is free to anyone with OS X 10.8.x Mountain Lion and later. To check that the Xcode has been updated: * Select Xcode in the menu bar * Select About Xcode * The version after applying this update will be "5.0". Information will also be posted to the Apple Security Updates web site: http://support.apple.com/kb/HT1222 This message is signed with Apple's Product Security PGP key, and details are available at: https://www.apple.com/support/security/pgp/ -----BEGIN PGP SIGNATURE----- Version: GnuPG/MacGPG2 v2.0.17 (Darwin) Comment: GPGTools - http://gpgtools.org iQIcBAEBAgAGBQJSOe7bAAoJEPefwLHPlZEwNygP/j/HD+lz/Y/8NBB7gQjaMb8N OUs7CrwZCsVC2ziDrn/Hry9roT2zOwgg3GOSdtr4h1erRm9eZd0fwqNAA/v+tuYi JFuLmPuLIgDvRLf97AWcKeebbwOLeG+zg0VJx6fTXrdG/jujncHZVCfLpL7KKCHz n8Jj0DSeOsONRNEpK2nGr5V3D/gX6OvYHieS5GcaFfcrIWz30I6maZJgOHgEv/yA z8uyysdPoTEpQ8TW9iHPJNlVWal+UyDYJAuLLVZ5H4ZeDhBuKV1fmK2MBlvFY307 rBeNje+kuloJUluH2KC1a86IqxJzhpv7/l+cpasaxitqnFsjH4YplwjofcyxB7D4 /Wdl9ZiUaQoL94FXhOHIfEARTNym7JkLAx4SkI0Tw+BHP7KYVwlU+g2ZsYVR6dQt +dgq7/ZBuivQfXpggRTb3bUdz1v8EvZ9Wz+ahF0yhurZt6zNWzJHe3sH2nS8MlPl vEfYqyg+NLR/EacRLkdHPfVlkmtNzn4HeCzTGNqfMnfaaumBYK6F00MTxHdnhz5h zYUiuooZrOCBp5IMCg20O5U03EJgu/8ayFAyG8sN84OB2pr1eVww87wAnyKUpwrP UMHkkn4PrBxBrcZWfc/71AD8sSv4X0miwiqvVe3Fxcekbtk8WGjdP89BU+rizey2 jXZBAo6nm5o4KNYY/5Bo =hxAK -----END PGP SIGNATURE-----