1. #1
    BonesMac  Nivel 2 MacPoints y autoridad de BonesMac MacPoints y autoridad de BonesMac MacPoints y autoridad de BonesMac MacPoints y autoridad de BonesMac MacPoints y autoridad de BonesMac MacPoints y autoridad de BonesMac
    Avatar de BonesMac

    Actualización OS X Yosemite 10.10.2 muy recomendada

    Hola Applesanos, que grata sorpresa llegar a casa y encontrarme con la actualización OS X Yosemite 10.10.2 que funciona estupendamente. He actualizado con la combo, siempre hago esa y OS X funciona como nunca.

    ¿Dónde las mejoras? Pues principalmente en los cascos BT que suenan estupendos y responde a los comandos super rápido.
    attachment.php?attachmentid=10779&d=1422454914

    Hay más novedades en la Airport con kext actualizados para algunas wi-fi pero yo nunca he tenido de esos problemas.

    Si aun no le tienes, ya tardas en descargar e instalar
    Download




  2. #2
    Mislata Nivel 2 MacPoints y autoridad de mislata MacPoints y autoridad de mislata MacPoints y autoridad de mislata MacPoints y autoridad de mislata
    Avatar de mislata

    Es altamente recomendada porque tiene muchos parches de seguridad, en Safari explorer y Spotlight desarrollados por el equipo de seguridad de Google.

    Otras mejoras:

    Esta actualización incluye lo siguiente:
    • Solución de un problema que causaba la desconexión de la red Wi-Fi
    • Solución de un problema que ralentizaba la carga de las páginas web
    • Corrección de un problema que hacía que Spotlight cargase el contenido del correo electrónico remoto aunque esta preferencia estuviese desactivada en Mail
    • Mejora de la sincronización del audio y el vídeo al utilizar auriculares Bluetooth
    • Posibilidad de explorar iCloud Drive en Time Machine
    • Mejora del funcionamiento del habla en VoiceOver
    • Solución de un problema que causaba el eco de los caracteres pronunciados por VoiceOver al introducir texto en una página web
    • Corrección de un problema que provocaba el cambio inesperado de idioma del método de entrada
    • Mejora de la estabilidad y la seguridad en Safari

    He actualizado un Macbook y un iMac sin problemas. A la tarde voy a echar un vistazo a uno no soportado, especialmente por boot.efi




  3. #3
    @maxim_apps Nivel 3 MacPoints y autoridad de maxim MacPoints y autoridad de maxim MacPoints y autoridad de maxim MacPoints y autoridad de maxim MacPoints y autoridad de maxim MacPoints y autoridad de maxim
    Avatar de maxim

    Como he dicho en otro foro la tengo por aquí sin ningún cambio importante. Estaba enrolado en la beta y es la misma build.

    En mac ninguna mejora sustancial, no sé si es una impresión solo mía, pero creo que que es otra actualización homeopática de Apple para no espantar a posibles compradores del Macbook Air y el Pro que están como indios cabreados con la wi-fi.

    attachment.php?attachmentid=7084&d=1422462051


    La combo solo me ha actualizado esos Kext, no veo ninguo de BT ni menos aun de Wi-Fi o Red Lan
    Eso si, en Mac Pro con Final Cut pro x y el nuevo Kernel de Yosemite optimizado, que digo optimizado, RE-optimizado que es más, ahora funciona con 64 Cores, 128 Cores o los que tu imaginación quiera.

    Es como mucho más fluido para comprimir con zip o rar. Va todo como la seda




  4. #4
    Applesan@ Nivel 1 MacPoints y autoridad de Sarita28 MacPoints y autoridad de Sarita28 MacPoints y autoridad de Sarita28
    Avatar de Sarita28

    Hola chic@s, yo soy una de esas personas con problemas en la Airport desde la llegada de Yosemite y Handoff. Un Apple especialista ha confirmado que OSX 10.10.2 está rota y posiblemente preparen otra actualización muy pronto.

    En la redacción tenemos tres Macs afectados por este problema de la Wi-Fi, no solo se desconecta cada 15 minutos, nos ha dejado sin Time Capsule. Es un Macbook Pro Retina de 2012 y dos iMac.


    attachment.php?attachmentid=10780&d=1422469510

    Por suerte tenemos Windows 8 con BootCamp y estamos trabajando con el. He llamado a Apple y me han propuesto hacer un downgrade a OS X Mavericks.

    El problema es que Apple no da soporte al problema de seguridad de Thunderbolt en OS X Mavericks. Conclusión, es el último Mac que compramos.

    Todos estos modelos se quedan sin soporte de seguridad si hacen downgrade a Mavericks, y si actualizan a Yosemite sin Wi-Fi.
    Un callejón sin salida

    iMac (21.5-inch, Late 2013) - iMac14,1/iMac14,3
    iMac (27-inch, Late 2013) - iMac14,2
    iMac (21.5-inch, Mid 2014) - iMac14,4
    iMac (Retina 5K, 27-inch, Late 2014) - iMac15,1
    MacBook Air (11-inch, Mid 2013)/(11-inch, Early 2014) - MacBookAir6,1
    MacBook Pro (Retina, Mid 2012)/(Retina, 15-inch, Early 2013) - MacBookPro10,1
    MacBook Pro (Retina, 13-inch, Late 2012)/(Retina, 13-inch, Early 2013) - MacBookPro10,2
    MacBook Pro (Retina, 13-inch, Late 2013)/(Retina, 13-inch, Mid 2014) - MacBookPro11,1
    MacBook Pro (Retina, 15-inch, Late 2013)/(Retina, 15-inch, Mid 2014) - MacBookPro11,2
    Mac mini (Late 2014) - Macmini7,1
    Mac Pro (Late 2013) - MacPro6,1

    Con unos beneficos récord no sé dónde meten el dinero y veo muy poco serio usar estos ordenadores para trabajar.




  5. #5
    BonesMac  Nivel 2 MacPoints y autoridad de BonesMac MacPoints y autoridad de BonesMac MacPoints y autoridad de BonesMac MacPoints y autoridad de BonesMac MacPoints y autoridad de BonesMac MacPoints y autoridad de BonesMac
    Avatar de BonesMac

    Me parece que me he precipitado al decir que funciona demasiado bien. Estando con los cascos bluetooth y Apple mail abierto, cuando le toca revisar automáticamente el correo se queda muerto. Tengo 10 cuentas, 5 pop y otras 5 IMAP tipo Gmail o iCloud.

    Es algo muy raro, la música en stream desde la radio en iTunes se escucha pero el Mac no responde, ni ratón ni nada para forzar la salida de Apple mail. Tengo que apagarlo desconectando de la corriente a lo bruto :-(




  6. #6
    Colaborador Nivel 1 MacPoints y autoridad de matrix MacPoints y autoridad de matrix
    Avatar de matrix

    Yo tengo un servicio de Verizon FiOS a 300 Mbps y lo más que obtengo es 105 Mbps. Es una KK Apple, Yosemite más que una actualización es un downgrade peor que iOS 8




  7. #7
    APP DJ TEAM Nivel 1 MacPoints y autoridad de Coquy MacPoints y autoridad de Coquy
    Avatar de Coquy

    No se como alguien puede ver mejoras, la actualización 10.10.2 solo son parches sobre parches. Apple a superado a Microsoft con Yosemite Vista


    OS X Yosemite v10.10.2 and Security Update 2015-001
    AFP Server
    Available for: OS X Mavericks v10.9.5

    Impact: A remote attacker may be able to determine all the network addresses of the system
    Description: The AFP file server supported a command which returned all the network addresses of the system. This issue was addressed by removing the addresses from the result.
    CVE-ID
    CVE-2014-4426 : Craig Young of Tripwire VERT
    bash

    Available for: OS X Yosemite v10.10 and v10.10.1
    Impact: Multiple vulnerabilities in bash, including one that may allow local attackers to execute arbitrary code
    Description: Multiple vulnerabilities existed in bash. These issues were addressed by updating bash to patch level 57.
    CVE-ID
    CVE-2014-6277
    CVE-2014-7186
    CVE-2014-7187
    Bluetooth
    Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5
    Impact: A malicious application may be able to execute arbitrary code with system privileges
    Description: An integer signedness error existed in IOBluetoothFamily which allowed manipulation of kernel memory. This issue was addressed through improved bounds checking. This issue does not affect OS X Yosemite systems.
    CVE-ID
    CVE-2014-4497


    Bluetooth
    Available for: OS X Yosemite v10.10 and v10.10.1
    Impact: A malicious application may be able to execute arbitrary code with system privileges
    Description: An error existed in the Bluetooth driver that allowed a malicious application to control the size of a write to kernel memory. The issue was addressed through additional input validation.
    CVE-ID
    CVE-2014-8836 : Ian Beer of Google Project Zero

    Bluetooth
    Available for: OS X Yosemite v10.10 and v10.10.1
    Impact: A malicious application may be able to execute arbitrary code with system privileges
    Description: Multiple security issues existed in the Bluetooth driver, allowing a malicious application to execute arbitrary code with system privilege. The issues were addressed through additional input validation.
    CVE-ID
    CVE-2014-8837 : Roberto Paleari and Aristide Fattori of Emaze Networks

    CFNetwork Cache
    Available for: OS X Yosemite v10.10 and v10.10.1
    Impact: Website cache may not be fully cleared after leaving private browsing
    Description: A privacy issue existed where browsing data could remain in the cache after leaving private browsing. This issue was addressed through a change in caching behavior.
    CVE-ID
    CVE-2014-4460

    CoreGraphics
    Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1
    Impact: Opening a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution
    Description: An integer overflow existed in the handling of PDF files. This issue was addressed through improved bounds checking.
    CVE-ID
    CVE-2014-4481 : Felipe Andres Manzano of the Binamuse VRT, via the iSIGHT Partners GVP Program


    CPU Software
    Available for: OS X Yosemite v10.10 and v10.10.1, for: MacBook Pro Retina, MacBook Air (Mid 2013 and later), iMac (Late 2013 and later), Mac Pro (Late 2013)
    Impact: A malicious Thunderbolt device may be able to affect firmware flashing
    Description: Thunderbolt devices could modify the host firmware if connected during an EFI update. This issue was addressed by not loading option ROMs during updates.
    CVE-ID
    CVE-2014-4498 : Trammell Hudson of Two Sigma Investments
    CommerceKit Framework
    Available for: OS X Yosemite v10.10 and v10.10.1
    Impact: An attacker with access to a system may be able to recover Apple ID credentials
    Description: An issue existed in the handling of App Store logs. The App Store process could log Apple ID credentials in the log when additional logging was enabled. This issue was addressed by disallowing logging of credentials.
    CVE-ID
    CVE-2014-4499 : Sten Petersen
    CoreGraphics
    Available for: OS X Yosemite v10.10 and v10.10.1
    Impact: Some third-party applications with non-secure text entry and mouse events may log those events
    Description: Due to the combination of an uninitialized variable and an application's custom allocator, non-secure text entry and mouse events may have been logged. This issue was addressed by ensuring that logging is off by default. This issue did not affect systems prior to OS X Yosemite.
    CVE-ID
    CVE-2014-1595 : Steven Michaud of Mozilla working with Kent Howard
    CoreGraphics
    Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5
    Impact: Opening a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution
    Description: A memory corruption issue existed in the handling of PDF files. The issue was addressed through improved bounds checking. This issue does not affect OS X Yosemite systems.
    CVE-ID
    CVE-2014-8816 : Mike Myers, of Digital Operatives LLC
    CoreSymbolication
    Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1
    Impact: A malicious application may be able to execute arbitrary code with system privileges
    Description: Multiple type confusion issues existed in coresymbolicationd's handling of XPC messages. These issues were addressed through improved type checking.
    CVE-ID
    CVE-2014-8817 : Ian Beer of Google Project Zero
    FontParser
    Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1
    Impact: Processing a maliciously crafted .dfont file may lead to an unexpected application termination or arbitrary code execution
    Description: A memory corruption issue existed in the handling of .dfont files. This issue was addressed through improved bounds checking.
    CVE-ID
    CVE-2014-4484 : Gaurav Baruah working with HP's Zero Day Initiative
    FontParser
    Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1
    Impact: Opening a maliciously crafted PDF file may lead to an unexpected application termination or arbitrary code execution
    Description: A buffer overflow existed in the handling of font files. This issue was addressed through improved bounds checking.
    CVE-ID
    CVE-2014-4483 : Apple
    Foundation
    Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1
    Impact: Viewing a maliciously crafted XML file may lead to an unexpected application termination or arbitrary code execution
    Description: A buffer overflow existed in the XML parser. This issue was addressed through improved bounds checking.
    CVE-ID
    CVE-2014-4485 : Apple
    Intel Graphics Driver
    Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1
    Impact: Multiple vulnerabilities in Intel graphics driver
    Description: Multiple vulnerabilities existed in the Intel graphics driver, the most serious of which may have led to arbitrary code execution with system privileges. This update addresses the issues through additional bounds checks.
    CVE-ID
    CVE-2014-8819 : Ian Beer of Google Project Zero
    CVE-2014-8820 : Ian Beer of Google Project Zero
    CVE-2014-8821 : Ian Beer of Google Project Zero
    IOAcceleratorFamily
    Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1
    Impact: A malicious application may be able to execute arbitrary code with system privileges
    Description: A null pointer dereference existed in IOAcceleratorFamily's handling of certain IOService userclient types. This issue was addressed through improved validation of IOAcceleratorFamily contexts.
    CVE-ID
    CVE-2014-4486 : Ian Beer of Google Project Zero
    IOHIDFamily
    Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1
    Impact: A malicious application may be able to execute arbitrary code with system privileges
    Description: A buffer overflow existed in IOHIDFamily. This issue was addressed with improved bounds checking.
    CVE-ID
    CVE-2014-4487 : TaiG Jailbreak Team
    IOHIDFamily
    Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1
    Impact: A malicious application may be able to execute arbitrary code with system privileges
    Description: A validation issue existed in IOHIDFamily's handling of resource queue metadata. This issue was addressed through improved validation of metadata.
    CVE-ID
    CVE-2014-4488 : Apple
    IOHIDFamily
    Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1
    Impact: A malicious application may be able to execute arbitrary code with system privileges
    Description: A null pointer dereference existed in IOHIDFamily's handling of event queues. This issue was addressed through improved validation of IOHIDFamily event queue initialization.
    CVE-ID
    CVE-2014-4489 : @beist
    IOHIDFamily
    Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1
    Impact: Executing a malicious application may result in arbitrary code execution within the kernel
    Description: A bounds checking issue existed in a user client vended by the IOHIDFamily driver which allowed a malicious application to overwrite arbitrary portions of the kernel address space. The issue is addressed by removing the vulnerable user client method.
    CVE-ID
    CVE-2014-8822 : Vitaliy Toropov working with HP's Zero Day Initiative
    IOKit
    Available for: OS X Yosemite v10.10 and v10.10.1
    Impact: A malicious application may be able to execute arbitrary code with system privileges
    Description: An integer overflow existed in the handling of IOKit functions. This issue was addressed through improved validation of IOKit API arguments.
    CVE-ID
    CVE-2014-4389 : Ian Beer of Google Project Zero
    IOUSBFamily
    Available for: OS X Yosemite v10.10 and v10.10.1
    Impact: A privileged application may be able to read arbitrary data from kernel memory
    Description: A memory access issue existed in the handling of IOUSB controller user client functions. This issue was addressed through improved argument validation.
    CVE-ID
    CVE-2014-8823 : Ian Beer of Google Project Zero
    Kernel
    Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1
    Impact: A malicious application may be able to execute arbitrary code with system privileges
    Description: Specifying a custom cache mode allowed writing to kernel read-only shared memory segments. This issue was addressed by not granting write permissions as a side-effect of some custom cache modes.
    CVE-ID
    CVE-2014-4495 : Ian Beer of Google Project Zero
    Kernel
    Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1
    Impact: A malicious application may be able to execute arbitrary code with system privileges
    Description: A validation issue existed in the handling of certain metadata fields of IODataQueue objects. This issue was addressed through improved validation of metadata.
    CVE-ID
    CVE-2014-8824 : @PanguTeam
    Kernel
    Available for: OS X Yosemite v10.10 and v10.10.1
    Impact: A local attacker can spoof directory service responses to the kernel, elevate privileges, or gain kernel execution
    Description: Issues existed in identitysvc validation of the directory service resolving process, flag handling, and error handling. This issue was addressed through improved validation.
    CVE-ID
    CVE-2014-8825 : Alex Radocea of CrowdStrike
    Kernel
    Available for: OS X Yosemite v10.10 and v10.10.1
    Impact: A local user may be able to determine kernel memory layout
    Description: Multiple uninitialized memory issues existed in the network statistics interface, which led to the disclosure of kernel memory content. This issue was addressed through additional memory initialization.
    CVE-ID
    CVE-2014-4371 : Fermin J. Serna of the Google Security Team
    CVE-2014-4419 : Fermin J. Serna of the Google Security Team
    CVE-2014-4420 : Fermin J. Serna of the Google Security Team
    CVE-2014-4421 : Fermin J. Serna of the Google Security Team
    Kernel
    Available for: OS X Mavericks v10.9.5
    Impact: A person with a privileged network position may cause a denial of service
    Description: A race condition issue existed in the handling of IPv6 packets. This issue was addressed through improved lock state checking.
    CVE-ID
    CVE-2011-2391
    Kernel
    Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1
    Impact: Maliciously crafted or compromised applications may be able to determine addresses in the kernel
    Description: An information disclosure issue existed in the handling of APIs related to kernel extensions. Responses containing an OSBundleMachOHeaders key may have included kernel addresses, which may aid in bypassing address space layout randomization protection. This issue was addressed by unsliding the addresses before returning them.
    CVE-ID
    CVE-2014-4491 : @PanguTeam, Stefan Esser
    Kernel
    Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1
    Impact: A malicious application may be able to execute arbitrary code with system privileges
    Description: A validation issue existed in the handling of certain metadata fields of IOSharedDataQueue objects. This issue was addressed through relocation of the metadata.
    CVE-ID
    CVE-2014-4461 : @PanguTeam


    LaunchServices
    Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1
    Impact: A malicious JAR file may bypass Gatekeeper checks
    Description: An issue existed in the handling of application launches which allowed certain malicious JAR files to bypass Gatekeeper checks. This issue was addressed through improved handling of file type metadata.
    CVE-ID
    CVE-2014-8826 : Hernan Ochoa of Amplia Security


    libnetcore
    Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1
    Impact: A malicious, sandboxed app can compromise the networkd daemon
    Description: Multiple type confusion issues existed in networkd's handling of interprocess communication. By sending networkd a maliciously formatted message, it may have been possible to execute arbitrary code as the networkd process. The issue is addressed through additional type checking.
    CVE-ID
    CVE-2014-4492 : Ian Beer of Google Project Zero


    LoginWindow
    Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1
    Impact: A Mac may not lock immediately upon wake
    Description: An issue existed in the rendering of the lock screen. This issue was address through improved screen rendering while locked.
    CVE-ID
    CVE-2014-8827 : Xavier Bertels of Mono, and multiple OS X seed testers


    lukemftp
    Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1
    Impact: Using the command line ftp tool to fetch files from a malicious http server may lead to arbitrary code execution
    Description: A command injection issue existed in the handling of HTTP redirects. This issue was addressed through improved validation of special characters.
    CVE-ID
    CVE-2014-8517


    OpenSSL
    Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1
    Impact: Multiple vulnerabilities in OpenSSL 0.9.8za, including one that may allow an attacker to downgrade connections to use weaker cipher-suites in applications using the library
    Description: Multiple vulnerabilities existed in OpenSSL 0.9.8za. These issues were addressed by updating OpenSSL to version 0.9.8zc.
    CVE-ID
    CVE-2014-3566
    CVE-2014-3567
    CVE-2014-3568


    Sandbox
    Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5
    Impact: A sandboxed process may be able to circumvent sandbox restrictions
    Description: A design issue existed in the caching of sandbox profiles which allowed sandboxed applications to gain write access to the cache. This issue was addressed by restricting write access to paths containing a “com.apple.sandbox” segment. This issue does not affect OS X Yosemite v10.10 or later.
    CVE-ID
    CVE-2014-8828 : Apple


    SceneKit
    Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5
    Impact: A malicious application could execute arbitrary code leading to compromise of user information
    Description: Multiple out of bounds write issues existed in SceneKit. These issues were addressed through improved bounds checking.
    CVE-ID
    CVE-2014-8829 : Jose Duart of the Google Security Team


    SceneKit
    Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1
    Impact: Viewing a maliciously crafted Collada file may lead to an unexpected application termination or arbitrary code execution
    Description: A heap buffer overflow existed in SceneKit’s handling of Collada files. Viewing a maliciously crafted Collada file may have led to an unexpected application termination or arbitrary code execution. This issue was addressed through improved validation of accessor elements.
    CVE-ID
    CVE-2014-8830 : Jose Duart of Google Security Team


    Security
    Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1
    Impact: A downloaded application signed with a revoked Developer ID certificate may pass Gatekeeper checks
    Description: An issue existed with how cached application certificate information was evaluated. This issue was addressed with cache logic improvements.
    CVE-ID
    CVE-2014-8838 : Apple


    security_taskgate
    Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1
    Impact: An app may access keychain items belonging to other apps
    Description: An access control issue existed in the Keychain. Applications signed with self-signed or Developer ID certificates could access keychain items whose access control lists were based on keychain groups. This issue was addressed by validating the signing identity when granting access to keychain groups.
    CVE-ID
    CVE-2014-8831 : Apple

    Spotlight
    Available for: OS X Yosemite v10.10 and v10.10.1
    Impact: The sender of an email could determine the IP address of the recipient
    Description: Spotlight did not check the status of Mail’s "Load remote content in messages" setting. This issue was addressed by improving configuration checking.
    CVE-ID
    CVE-2014-8839 : John Whitehead of The New York Times, Frode Moe of LastFriday.no



    Spotlight
    Available for: OS X Mountain Lion v10.8.5, OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1
    Impact: Spotlight may save unexpected information to an external hard drive
    Description: An issue existed in Spotlight where memory contents may have been written to external hard drives when indexing. This issue was addressed with better memory management.
    CVE-ID
    CVE-2014-8832 : F-Secure
    SpotlightIndex


    Available for: OS X Yosemite v10.10 and v10.10.1
    Impact: Spotlight may display results for files not belonging to the user
    Description: A deserialization issue existed in Spotlight's handling of permission caches. A user performing a Spotlight query may have been shown search results referencing files for which they don't have sufficient privileges to read. This issue was addressed with improved bounds checking.
    CVE-ID
    CVE-2014-8833 : David J Peacock, Independent Technology Consultant
    sysmond
    Available for: OS X Mavericks v10.9.5, OS X Yosemite v10.10 and v10.10.1
    Impact: A malicious application may be able to execute arbitrary code with root privileges
    Description: A type confusion vulnerability existed in sysmond that allowed a local application to escalate privileges. The issue was addressed with improved type checking.
    CVE-ID


    CVE-2014-8835 : Ian Beer of Google Project Zero
    UserAccountUpdater


    Available for: OS X Yosemite v10.10 and v10.10.1
    Impact: Printing-related preference files may contain sensitive information about PDF documents
    Description: OS X Yosemite v10.10 addressed an issue in the handling of password-protected PDF files created from the Print dialog where passwords may have been included in printing preference files. This update removes such extraneous information that may have been present in printing preference files.
    CVE-ID
    CVE-2014-8834 : Apple


    OS X Yosemite no hay por dónde cogerlo ni con pinzas.


    .




  8. #8
    @maxim_apps Nivel 3 MacPoints y autoridad de maxim MacPoints y autoridad de maxim MacPoints y autoridad de maxim MacPoints y autoridad de maxim MacPoints y autoridad de maxim MacPoints y autoridad de maxim
    Avatar de maxim

    Amigo eso es porque OS X Yosemite está optimizado para redes de Congo Belga, Camerún y la republica bananera de Nicaragua.

    Ten encuenta que Apple ha descubierto en iPhone 6 Plus los misterios de una red 4G a 150MB. Esperate que se entere del 4G Plus español a 300 MBps de los Snapdragon 620, 618, 425, y 415 con modem X8 LTE Cat 7 y descargas a 300Mbps y subidas a 100Mbps. Perfectos para Ono y fibra de Movistar.

    Ya fuera de coñas, la verdad es que me da bastante pena la de criaturas que hay con un Macbook Air 2014 y un Apple TV viendo pelis entrecortadas por no querer contratar a un ingeniero que sepa de qué va el TCP/IP ni sus fundamentos.


    Cita matrix dijo: Ver Mensaje
    Yo tengo un servicio de Verizon FiOS a 300 Mbps y lo más que obtengo es 105 Mbps. Es una KK Apple, Yosemite más que una actualización es un downgrade peor que iOS 8




  9. #9
    Tímido Nivel 0 MacPoints y autoridad de albertoporras
    me parece un acierto el OSX




  10. #10
    APP DJ TEAM Nivel 1 MacPoints y autoridad de Coquy MacPoints y autoridad de Coquy
    Avatar de Coquy

    ¿Qué tal Bro? ¿Tú crees que es un acierto? Entonces no entiendo porqué ningún español lo tiene instalado, solo unos pocos applesanos, no leo a nadie hablar de Yosemite en ningún sitio en español a parte de aquí.
    Y en Latinoamérica menos aun aunque se explica porque apenas nadie se puede permitir un Mac moderno.


    Cita albertoporras dijo: Ver Mensaje
    me parece un acierto el OSX




Notas relacionadas con este artículo que te pueden interesar

  1. Comentarios: 0
    Último comentario: 12/06/15, 12:36:06
  2. Actualización iDraw 2.5, compatible con Handoff en OS X Yosemite
    Publicado por BonesMac en Fotografía Digital / Diseño Gráfico
    Comentarios: 0
    Último comentario: 15/01/15, 14:36:43
  3. Actualización iFFmpeg 5.0.8 para OS X Yosemite
    Publicado por BonesMac en Audio / Vídeo Digital
    Comentarios: 0
    Último comentario: 19/11/14, 10:17:09
  4. Comentarios: 0
    Último comentario: 24/08/14, 16:42:26
  5. Canon PIXMA MP495 WI-FI recomendada con OSX ML y iOS 6
    Publicado por maxim en Hardware / Periféricos Mac
    Comentarios: 0
    Último comentario: 30/04/11, 14:31:50

Otros temas destacados