Apple subdues solo IPv6 bug
10-4: Apple releases Mac OS X 10.4.10, first-ever dot-10 upgrade
Computerworld - Apple Inc. today released Mac OS X 10.4.10 to patch a single security vulnerability and address several issues in Bluetooth and USB, add RAW image support for eight new cameras, and fix a decimal rounding error.
The update patches the IPv6 protocol's handling of type 0 routing heads, which if exploited by an attacker, could degrade network performance, Apple said in a short alert. Only Mac OS X 10.4.x versions are affected by the bug.
Other changes bundled with 10.4.10 make sure the operating system correctly deletes Bluetooth headsets from the available list when it's been removed from preferences, resolves corruption problems in DNG images, and improves the reliability of mounting external USB hard drives. It also adds RAW support for several digital Panasonic, Leica, Fuji, Nikon, and Canon cameras; fixes calendar calculation errors; and corrects a decimal rounding error Apple said appear in unspecified "some applications."
The update -- which ranges from 25MB for the PowerPC client to 391MB for the universal Server edition -- can be downloaded from Apple's site, or retrieved using Software Update. As of Wednesday, 8:00 p.m. EDT, only a handful of users on Apple's support forums had posted messages detailing problems with the update.
Several Apple bloggers and enthusiast sites have noted that this is the first time Apple has turned out a tenth version of an operating system. Chatter about a dot-10 for Tiger started two months ago, when Apple announced it would delay 10.5, a.k.a. Leopard, until October because it needed to shift development resources to the iPhone.
Read more about Security in Computerworld's Security Topic Center.
- Top 12 Laptop Bags for Mobile Pros
- Think Deleted Text Messages Are Gone Forever? Think Again
- 7 New Faces of the C-suite
- 5 Ways CIOs Can Rationalize Application Portfolios
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Five Cloud Security Concerns You Must Address Security for the cloud era should be information centric, built in, adaptive, and proactive. How can you respond to the new threat landscape...
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Alert Logic for PCI DSS Compliance To achieve PCI DSS compliance, you must identify and remediate all critical vulnerabilities detected during PCI scans. Threat Manager streamlines this process by...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts