Jump to content

Mac OS X v10.6.3 v1.1 Update (Combo)


yossicl
 Share

13 posts in this topic

Recommended Posts

 

 

About Mac OS X v10.6.3 v1.1 Update (Combo)

The 10.6.3 Update is recommended for all users running Mac OS X Snow Leopard and includes general operating system fixes that enhance the stability, compatibility, and security of your Mac, including fixes that:

 

  • improve the reliability and compatibility of QuickTime X
  • address compatibility issues with OpenGL-based applications
  • address an issue that causes background message colors to display incorrectly in Mail
  • resolve an issue that prevented files with the # or & characters in their names from opening in Rosetta applications
  • resolve an issue that prevented files from copying to Windows file servers
  • improve performance of Logic Pro 9 and Main Stage 2 when running in 64-bit mode
  • improve sleep and wake reliability when using Bonjour wake on demand
  • address a color issue in iMovie with HD content
  • improve printing reliability
  • resolve issues with recurring events in iCal when connected to an Exchange server
  • improve the reliability of 3rd party USB input devices
  • fix glowing, stuck, or dark pixels when viewing video from the iMac (Late 2009) built-in iSight camera

 

For detailed information on this update, please visit this website: http://support.apple.com/kb/HT4014.

Link to comment
Share on other sites

Yesterday, "Software update" downloaded 630kb update of version 1.1

 

Seems like Apple has either recruited some Microsoft guys or started to loose couple of nuts and bolts.

Come on, Just after 10.6.3, release version 1.1

 

Enough denigration, update was smooth and nothing was broken. :rolleyes:

(10.6.3 --> 10.6.3-1.1)

Link to comment
Share on other sites

maybe this explains it

 

Apple patches Pwn2Own exploit in Mac OS X

By Jeff Smykil

 

Apple issued Security Update 2010-003 on Wednesday afternoon for Mac OS X v.10.5.8 client and server, as well as Mac OS X v.10.6.3 client and server. The updates address an issue in the way Apple Type Services handles embedded fonts, preventing the “arbitrary execution of code” after a document is viewed or downloaded. Complete details about the update are available in the support section of Apple’s website.

 

Apple confirmed that the exploit was none other than the one that was discovered on the first day of the Pwn2Own contest that we reported on last month. The event marked the third year in a row in which security researcher Charlie Miller was able to compromise a Mac running OS X. At the time, many believed the hack exploited an issue in Safari but, as we discovered today, the problem stemmed from the Apple Type Services that Safari makes use of.

 

With this update, Apple has effectively patched half of the exploits found during this year's Pwn2Own. Still, Apple has yet to patch an iPhone vulnerability discovered by Vincenzo Iozzo and Ralf Philipp Weinmann, which allows undesired access to text messages in the iPhone OS.

 

http://arstechnica.com/apple/news/2010/04/...in-mac-os-x.ars

Link to comment
Share on other sites

 Share

×
×
  • Create New...