Lucian Constantin
CSO Senior Writer

Apple patches vulnerable OS X Git version that put developers at risk

news
May 5, 20162 mins

A month and a half later, Apple imports Git patches for critical remote code execution flaws

Apple has released a new version of its Xcode development tool in order to patch two critical vulnerabilities in the Git source code management client.

The Git vulnerabilities, CVE‑2016‑2324 and CVE‑2016‑2315, have been known since mid-March and can be exploited when cloning a repository with a specially crafted file structure. This allows attackers to execute malicious code on systems where such cloning operations were initiated.

Xcode is an IDE (integrated development environment) used by a large number of developers to write applications for OS X and iOS. It includes a package called the OS X Command Line Tools for Xcode that contains the open-source Git client.

The version of Git shipped with the command line tools package has now been updated to 2.7.4. This version was released by the Git developers on March 17, but it took Apple a month and a half to integrate into Xcode.

Some systems administrators criticized Apple last month for dragging its feet on importing the upstream patches for such serious flaws. In the absence of a fix, they had to resort to hackery in order to disable Git on Macs in their organizations, potentially breaking workflows.

The Command Line Tools package is not installed by default on OS X, but users can install it separately from Xcode itself. Systems who have it installed should receive an update notification through the Mac App Store.

Lucian Constantin

Lucian Constantin writes about information security, privacy, and data protection for CSO. Before joining CSO in 2019, Lucian was a freelance writer for VICE Motherboard, Security Boulevard, Forbes, and The New Stack. Earlier in his career, he was an information security correspondent for the IDG News Service and Information security news editor for Softpedia.

Before he became a journalist, Lucian worked as a system and network administrator. He enjoys attending security conferences and delving into interesting research papers. He lives and works in Romania.

You can reach him at lucian_constantin@foundryco.com or @lconstantin on X. For encrypted email, his PGP key's fingerprint is: 7A66 4901 5CDA 844E 8C6D 04D5 2BB4 6332 FC52 6D42

More from this author