Language Selection

English French German Italian Portuguese Spanish

Apple Releases Mega Patch

Filed under
Mac

Apple Computer late Tuesday released an update to fix a whopping 20 security flaws in its flagship Mac OS X and warned that the most serious bugs could lead to remote code execution attacks.

Apple Computer Inc.'s Security Update 2005-005 includes patches for Mac OS X v10.3.9 and Mac OS X Server v10.3.9. It covers a wide range of vulnerabilities that could be exploited by remote or local attackers to execute arbitrary commands, trigger a denial-of-service condition or obtain elevated privileges.

The mega update comes just two weeks after the Cupertino, Calif.-based computer maker shipped patches for a range of potentially serious kernel and browser flaws. Since April 18, Apple has posted fixes for 28 Mac OS X vulnerabilities.
The latest update includes fixes for a buffer overflow in the Apache htdigest program and an integer overflow in the handling of TIFF files that could permit arbitrary code execution.

Full Story.

More in Tux Machines

OSS Leftovers

SUSE Leftovers

  • openSUSE Tumbleweed – Review of the Week 2016/48
    After releasing daily snapshots without interruption for 17 days, Tumbleweed did slow down a bit during the last week. As already mentioned in my last review, 1124 had been canceled due to an issue with sddm installing strange branding configurations. And later on, we ‘broke’ our own staging setup and needed to bootstrap a few of them, making the throughput much lower than you were used to. So, we ended up with 3 snapshots since my last review: 1125, 1128 and 1129.
  • Highlights of YaST development sprint 28
    November is over, Santa Claus elves start to stress and the YaST team brings you one of the last reports of 2016. Let’s see what’s new in YaSTland.

OSS: AI and Machine Learning

Ubuntu and Derivatives

  • Canonical Sues Cloud Provider, Mint Beta, Devuan Tour
    Ubuntu parent-company, Canonical, today posted that they've been in a dispute with "a European cloud provider" over their use of their own homespun version of Ubuntu on their cloud servers. Their implementation disables even the most basic of security features and Canonical is worried something bad could happen and it'd reflect badly back on them. The post read, "The home-grown images of this provider disable fundamental security mechanisms and modify the system in ways that are unsupportable. They are likely to behave unpredictably on update in weirdly creative and mysterious ways." They said they've spent months trying to get the unnamed provider to use the standard Ubuntu as delivered to other commercial operations to no avail. Canonical feels they have no choice but to "take legal steps to remove these images." They're sure Red Hat and Microsoft wouldn't be treated like this.
  • Taking a stand against unofficial Ubuntu images
    Ubuntu is amazing on the cloud because we work with cloud providers to ensure crisp, consistent and secure images which you can auto-update safely. On every major cloud—AWS, Azure, Google, Rackspace, SoftLayer and many more—you can be confident that ‘Ubuntu’ is Ubuntu, with the same commitment to quality that you can expect when you install it yourself, and we can guarantee that to you because we require that clouds offer only certified Ubuntu images.
  • Canonical Takes Stand Against Unofficial Ubuntu Images, Reportedly Risky & Insecure
    Mark Shuttleworth has written a new blog post where he's outlining a dispute Canonical is having with a European cloud provider over a breach of contract and "publishing insecure, broken images of Ubuntu" for its cloud customers. With these Ubuntu Cloud unofficial images reportedly being buggy, users are complaining to Canonical/Ubuntu, assuming it's an upstream issue. Having enough of that, they are now preparing for legal steps to remove the unofficial Ubuntu images from the particular cloud provider.
  • Linux Mint 18.1 “Serena” MATE – BETA Release
  • Linux Mint 18.1 “Serena” Cinnamon – BETA Release