[Fed-Talk] Re: Fed-talk Digest, Vol 7, Issue 275
[Fed-Talk] Re: Fed-talk Digest, Vol 7, Issue 275
- Subject: [Fed-Talk] Re: Fed-talk Digest, Vol 7, Issue 275
- From: "Thomas, Christopher CIV DTIC Z" <email@hidden>
- Date: Wed, 22 Sep 2010 12:23:45 -0400
- Thread-topic: Fed-talk Digest, Vol 7, Issue 275
Title: Re: Fed-talk Digest, Vol 7, Issue 275
I am interested in how Apple is detailing CAC capabilities in 10.6.4. We are able to recognize the CAC and connect to some sites. Others are not connecting. As serious bug appears to be causing corruption of the keychain file with DoD root certs. Setting always trust on some certs causes the operating program (Safari or Keychain) to crash and corrupt the preferences file.
On 9/21/10 3:04 PM, "email@hidden" <email@hidden> wrote:
Send Fed-talk mailing list submissions to
email@hidden
To subscribe or unsubscribe via the World Wide Web, visit
http://lists.apple.com/mailman/listinfo/fed-talk
or, via email, send a message with subject or body 'help' to
email@hidden
You can reach the person managing the list at
email@hidden
When replying, please edit your Subject line so it is more specific
than "Re: Contents of Fed-talk digest..."
Today's Topics:
1. Apple Releases Security Update 2010-006 (Kim, Andy (Gregg))
----------------------------------------------------------------------
Message: 1
Date: Tue, 21 Sep 2010 12:08:38 -0400
From: "Kim, Andy (Gregg)" <email@hidden>
Subject: [Fed-Talk] Apple Releases Security Update 2010-006
To: "email@hidden" <email@hidden>, "Kim, Andy
(Gregg)" <email@hidden>
Message-ID: <C8BE50C6.2209%email@hidden">C8BE50C6.2209%email@hidden>
Content-Type: text/plain; charset="us-ascii"
Apple Releases Security Update 2010-006
Original release date: September 21, 2010 at 8:00 am
Last revised: September 21, 2010 at 8:00 am
Apple has released security update 2010-006 for Mac OS X and Mac OS X Server to address a vulnerability in the AFP package.
This vulnerability may allow an attacker to bypass password validation and obtain sensitive information.
The article indicates that this vulnerability does not affect systems prior to Mac OS X v10.6.
Relevant Url(s):
http://support.apple.com/kb/HT4361
Regards,
Andy Kim
Director of IT
U.S. Senator Judd Gregg
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.apple.com/mailman/private/fed-talk/attachments/20100921/c10be41d/attachment-0001.html
------------------------------
_______________________________________________
Fed-talk mailing list
email@hidden
http://lists.apple.com/mailman/listinfo/fed-talk
End of Fed-talk Digest, Vol 7, Issue 275
****************************************
--
Christopher Thomas
Chief Technology Officer
Defense Technical Information Center
email@hidden
703-767-9124
DKO e-mail
email@hidden
_______________________________________________
Do not post admin requests to the list. They will be ignored.
Fed-talk mailing list (email@hidden)
Help/Unsubscribe/Update your Subscription:
This email sent to email@hidden