Apple subdues solo IPv6 bug
10-4: Apple releases Mac OS X 10.4.10, first-ever dot-10 upgrade
Computerworld - Apple Inc. today released Mac OS X 10.4.10 to patch a single security vulnerability and address several issues in Bluetooth and USB, add RAW image support for eight new cameras, and fix a decimal rounding error.
The update patches the IPv6 protocol's handling of type 0 routing heads, which if exploited by an attacker, could degrade network performance, Apple said in a short alert. Only Mac OS X 10.4.x versions are affected by the bug.
Other changes bundled with 10.4.10 make sure the operating system correctly deletes Bluetooth headsets from the available list when it's been removed from preferences, resolves corruption problems in DNG images, and improves the reliability of mounting external USB hard drives. It also adds RAW support for several digital Panasonic, Leica, Fuji, Nikon, and Canon cameras; fixes calendar calculation errors; and corrects a decimal rounding error Apple said appear in unspecified "some applications."
The update -- which ranges from 25MB for the PowerPC client to 391MB for the universal Server edition -- can be downloaded from Apple's site, or retrieved using Software Update. As of Wednesday, 8:00 p.m. EDT, only a handful of users on Apple's support forums had posted messages detailing problems with the update.
Several Apple bloggers and enthusiast sites have noted that this is the first time Apple has turned out a tenth version of an operating system. Chatter about a dot-10 for Tiger started two months ago, when Apple announced it would delay 10.5, a.k.a. Leopard, until October because it needed to shift development resources to the iPhone.
Read more about Security in Computerworld's Security Topic Center.
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts