Tag: buffer

  • macOS 15 beta 2 notes point towards less drive space being needed for app installations

    macOS 15 beta 2 notes point towards less drive space being needed for app installations

    This should come in handy, or at least alleviate a minor headache when installing the macOS or applications.

    Apple on Tuesday announced that beginning with macOS Sequoia, app downloads and installations from the Mac App Store will no longer require double the amount of local storage space available. Instead, the free space requirement now matches the final install size of the app, plus a small buffer.

    As of now, within macOS Sonoma, users have to ensure they have double the required space for an installation. This can result in having to clear space for tens to hundreds of gigabytes of data prior to the installation, which can be its own headache.

    As of macOS 15 beta 2, users only need enough space for the installation’s final size, plus a small buffer. By aligning the free space requirements more closely with actual app sizes, macOS 15 should give users a better idea ahead of time of whether they can install an app from the Mac App Store, which will make general storage management easier.

    Apple has told developers to update their software relating to app size requirements, which should help reduce confusion as to how much space should be available for installations. macOS Sequoia is currently in its second developer beta, with a public beta expected in July, followed by a general release in the fall.

    Stay tuned for additional details as they become available.

    Via MacRumors and developer.apple.com

  • Apple releases macOS Monterey 11.6.9, macOS Big Sur 11.7.10, iOS 15.7.9, and iPadOS 15.7.9, offers security updates for older devices

    Apple releases macOS Monterey 11.6.9, macOS Big Sur 11.7.10, iOS 15.7.9, and iPadOS 15.7.9, offers security updates for older devices

    If you were hankering for the security updates Apple released last week for older versions of macOS, iOS, and iPadOS, they’re here.

    Apple rolled out macOS Monterey 11.6.9, macOS Big Sur 11.7.10, iOS 15.7.9, and iPadOS 15.7.9 on Monday. The updates address a security issue, and can be installed using existing update systems in each operating system, such as under Settings then General then Software Update under iOS and iPadOS.

    These patches all include a security update for CVE-2023-41064, where a “maliciously crafted image may lead to arbitrary code execution” via ImageIO. The patch addresses a buffer overflow issue with improved memory handling.

    Apple has also stated that it is “aware of a report that this issue may have been actively exploited.”

    CVE-2023-41064’s discovery is credited to The Citizen Lab at The University of Torontos Munk School.

    Via AppleInsider and support.apple.com

  • AT&T, Verizon begin rolling out C-Band 5G spectrum, still in talks with FAA over potential altimeter conflicts

    AT&T, Verizon begin rolling out C-Band 5G spectrum, still in talks with FAA over potential altimeter conflicts

    Following weeks of delays and kerfuffle from conflicts with the aviation industry, wireless carriers AT&T and Verizon on Wednesday began deploying C-Band 5G spectrum to improve the availability of 5G connectivity for users across the United States.

    AT&T’s C-Band spectrum is live in limited parts of eight metro areas that include Austin, Chicago, Dallas Ft. Worth, Detroit, Houston, Jacksonville, Orlando, and South Florida. AT&T is taking a careful approach to the rollout, but the carrier says that C-Band spectrum will “expand rapidly” as part of a ramp up in its “thoughtful and efficient deployment.” iPhone users who have access to AT&T’s C-Band network or previously existing mmWave connectivity will see a “5G+” indicator in the ‌iPhone‌’s cellular status bar. As for Verizon, the company earlier this month announced plans to expand its 5G Ultra Wideband service to 1,700 cities later in January, and that expansion started today with the launch of C-Band spectrum. Verizon users shared details on where Verizon’s 5G connectivity has suddenly improved, noting the locations where C-Band connectivity is live. Verizon users will see a “5G UW” indicator.

    There have also been reports of C-Band activity having gone line from across the United States, including Los Angeles, Nashville, Salt Lake City, Chicago, Minneapolis, Rochester, and many other smaller cities. Verizon has stated that it expects to bring C-Band rollout, along with faster 5G speeds, to more than 100 million people, but has yet to offer a C-Band coverage map to the public for dissemination.

    Where speeds are concerned, AT&T’s 5G+ and Verizon’s 5G Ultra Wideband protocols are up to 10x faster than LTE speeds and can hit upwards of a gigabit per second.

    Though impressive, both Verizon and AT&T have his a wall with their C-Band deployment near airport runways, as the wireless carriers and the Federal Aviation Administration (FAA) has postponed deployment in order to sort out potential issues between the 5G networks and altimeter instruments found on older airplanes.

    Earlier this week, major U.S. airlines penned an urgent letter warning that the 5G rollout could cause a “catastrophic” crisis resulting in cancelled, delayed, and diverted flights. The conflict, under certain conditions, could potentially cause a plane’s altimeter to display the wrong altitude, which could endanger flights during operation.

    As such, the FAA has temporary implemented buffer zones surrounding 50 major airports with wireless transmitters close to runways. AT&T and Verizon will block off a two mile zone around affected airports to address concerns.

    Airlines and the two carriers have expressed frustrations over the FAA’s lack of action, as the agency has had years to prepare. C-Band spectrum went up for auction in late 2020, with Verizon paying $45 billion and AT&T paying $23 billion for access.

    Stay tuned for additional details as they become available.

    Via MacRumors, Reddit, and AT&T

  • Apple releases iOS 10.2.1 update

    It’s been a day for updates and Apple just released iOS 10.2.1, the current version of its mobile operating system.

    The update, which weighs in between 65 megabytes and over a gigabyte depending on whether you download it over the air or via iTunes, offers the following fixes and changes:

    Auto Unlock
    Impact: Auto Unlock may unlock when Apple Watch is off the user’s wrist.
    Desription: A logic issue was addressed through improved state management.

    Contacts
    Impact: Processing a maliciously crafted contact card may lead to unexpected application termination.
    Desription: An input validation issue existed in the parsing of contact cards. This issue was addressed through improved input validation.

    (more…)

  • Google Chrome updated to 23.0.1271.64

    google-chrome-logo

    It’s the bug fixes that make a difference.

    Late Tuesday, Google released a beta of version 23.0.1271.64 of its Chrome web browser. The update, a 56.5 megabyte download, adds the following fixes and changes:

    – Medium CVE-2012-5127: Integer overflow leading to out-of-bounds read in WebP handling. Credit to Phil Turnbull.

    – High CVE-2012-5116: Use-after-free in SVG filter handling. Credit to miaubiz.

    – [Mac OS only] [149717] High CVE-2012-5118: Integer bounds check issue in GPU command buffers. Credit to miaubiz.

    – High CVE-2012-5121: Use-after-free in video layout. Credit to Atte Kettunen of OUSPG.

    – Low CVE-2012-5117: Inappropriate load of SVG subresource in img context. Credit to Felix Groebert of the Google Security Team.

    – Medium CVE-2012-5119: Race condition in Pepper buffer handling. Credit to Fermin Serna of the Google Security Team.

    – Medium CVE-2012-5122: Bad cast in input handling. Credit to Google Chrome Security Team (Inferno).

    – Medium CVE-2012-5123: Out-of-bounds reads in Skia. Credit to Google Chrome Security Team (Inferno).

    – High CVE-2012-5124: Memory corruption in texture handling. Credit to Al Patrick of the Chromium development community.

    – Medium CVE-2012-5125: Use-after-free in extension tab handling. Credit to Alexander Potapenko of the Chromium development community.

    – Medium CVE-2012-5126: Use-after-free in plug-in placeholder handling. Credit to Google Chrome Security Team (Inferno).

    – High CVE-2012-5128: Bad write in v8. Credit to Google Chrome Security Team (Cris Neckar).

    Google Chrome 23.0.1271.64 requires an Intel-based Mac with Mac OS X 10.5 or later to install and run. If you’ve tried the new version and have any feedback to offer, please let us know in the comments.