About the security content of Xcode 9

This document describes the security content of Xcode 9.

About Apple security updates

For our customers' protection, Apple doesn't disclose, discuss, or confirm security issues until an investigation has occurred and patches or releases are available. Recent releases are listed on the Apple security updates page.

For more information about security, see the Apple Product Security page. You can encrypt communications with Apple using the Apple Product Security PGP Key.

Apple security documents reference vulnerabilities by CVE-ID when possible.

Xcode 9

Released September 19, 2017

Git

Available for: macOS Sierra 10.12.6 or later

Impact: Checking out a maliciously crafted repository may lead to arbitrary code execution

Description: An ssh:// URL scheme handling issue was addressed through improved input validation.

CVE-2017-1000117

ld64

Available for: macOS Sierra 10.12.6 or later

Impact: Parsing a maliciously crafted Mach-O file may lead to arbitrary code execution

Description: Multiple memory corruption issues were addressed with improved memory handling.

CVE-2017-7076, CVE-2017-7134, CVE-2017-7135, CVE-2017-7136, CVE-2017-7137: riusksk (泉哥) of Tencent Security Platform Department

subversion

Available for: macOS Sierra 10.12.6 or later

Impact: Checking out a maliciously crafted repository may lead to arbitrary code execution

Description: An input validation issue was addressed through improved input validation.

CVE-2017-9800

Additional recognition

Swift Package Manager

We would like to acknowledge Vincent Esche for their assistance.

Information about products not manufactured by Apple, or independent websites not controlled or tested by Apple, is provided without recommendation or endorsement. Apple assumes no responsibility with regard to the selection, performance, or use of third-party websites or products. Apple makes no representations regarding third-party website accuracy or reliability. Risks are inherent in the use of the Internet. Contact the vendor for additional information. Other company and product names may be trademarks of their respective owners.

Published Date: