

- #MACOS 10.13 PDF#
- #MACOS 10.13 INSTALL#
- #MACOS 10.13 UPDATE#
- #MACOS 10.13 PRO#
- #MACOS 10.13 PASSWORD#
#MACOS 10.13 UPDATE#
The update also addressed the Meltdown and Spector vulnerabilities (prior to them becoming widely known). Improves compatibility of Braille displays with Mail.
#MACOS 10.13 PDF#
Improves VoiceOver navigation when viewing PDF documents in Preview.Improves compatibility with certain third-party USB audio devices.To protect against ‘Spectre’ Apple issued a Supplemental Update to macOS 10.13.2 which includes a Spectre fix for Safari and WebKit. Apple also says that the update “addresses an issue that could cause Messages conversations to be temporarily listed out of order.”

Find out more about the malicious link that is capable of crashing iOS and macOS if you click on it from the Messages app here. The 10.13.3 update also offered additional fixes for the Spectre and Meltdown vulnerabilities mentioned below.Īpple also confirmed that this version of macOS also includes a fix for the ChaiOS text crash bug.
#MACOS 10.13 INSTALL#
If they did so they could enable App Store settings that would automatically install app updates which could put your Mac at risk (although the app update would have to go through the Mac App Store and be approved by Apple, and it would only work if the Mac was already logged in as an administrator.) That vulnerability allowed someone to gain access to App Store settings in System Preferences. Not present in the latest update, but thought to be coming soon:
#MACOS 10.13 PASSWORD#
#MACOS 10.13 PRO#
Use an eGPU with your MacBook Pro while its built-in display is closed.Charge a MacBook Pro while using the eGPU.Use virtual reality headsets plugged into the eGPU.Connect additional external monitors and displays.Accelerate applications that use Metal, OpenGL, and OpenCL.

Ionescu also says that performance drop on a system with PCID (Process-Context Identifiers), available on most modern Macs, is "minimal," so most users may not see an impact on day-to-day Mac usage. It appears Macs may not be hit as heavily, as no noticeable performance slowdowns have been reported since the launch of macOS 10.13.2. Implementing Kernel Page Table Isolation could cause a performance hit on some machines.Īccording to The Register, which first shared details on the vulnerability, Windows and Linux machines will see a 5 to 30 percent slowdown once a fix is in place. Alex Ionescu January 3, 2018Publicized yesterday, the design flaw in Intel chips allows normal user programs to see some of the contents of the protected kernel memory, potentially giving hackers and malicious programs access to sensitive information like passwords, login keys, and more.įull details on the vulnerability continue to be unavailable and under embargo, so it's not yet clear just how serious it is, but fixing it involves isolating the kernel's memory from user processes using Kernel Page Table Isolation at the OS level. Say hello to the "Double Map" since 10.13.2 - and with some surprises in 10.13.3 (under Developer NDA so can't talk/show you). The question on everyone's minds: Does MacOS fix the Intel #KPTI Issue? Why yes, yes it does.
