Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Apple on Mac flaw: ‘We apologize to all Mac users. Our customers deserve better.
MacDailyNews ^ | November 29, 2017

Posted on 11/29/2017 3:49:52 PM PST by Swordmaker

"We are auditing our development processes."

“Apple Inc said on Wednesday it would review its software development process a day after a researcher discovered a bug in a new version of its Mac operating system that could give hackers total control of vulnerable machines,” Stephen Nellis reports for Reuters. “Apple said it released a patch to fix the bug on Wednesday morning and it would be automatically installed on vulnerable machines later in the day.”

“‘We greatly regret this error and we apologize to all Mac users,’ Apple said in a statement. ‘Our customers deserve better. We are auditing our development processes to help prevent this from happening again,'” Nellis reports. “The U.S. and German governments issued alerts advising Mac users to install the patch.”

“Apple said its security engineers learned of the problem on Tuesday afternoon and posted the patch within 24 hours,” Nellis reports. “‘Security is a top priority for every Apple product, and regrettably we stumbled with this release of Mac OS,’ Apple said in its statement.”

Read more in the full article here.

MacDailyNews Take: Perhaps this latest snafu has finally been the wake up call Apple needed.

We trust Apple to stay true to their word and expect them to up their game (not just in software, but across the board) which, in recent years, simply has not measured up to the fastidious level of excellence set and maintained for so long by Steve Jobs.

Be a yardstick of quality. Some people aren’t used to an environment where excellence is expected. — Steve Jobs



TOPICS: Business/Economy; Computers/Internet
KEYWORDS: applemac; applepinglist; patch; rootvulnerability; security
Navigation: use the links below to view more comments.
first 1-2021-29 next last

1 posted on 11/29/2017 3:49:53 PM PST by Swordmaker
[ Post Reply | Private Reply | View Replies]

To: Swordmaker

Government Deep State API exposed...


2 posted on 11/29/2017 3:53:15 PM PST by GraceG ("It's better to have all the Right Enemies, than it is to have all the Wrong Friends.")
[ Post Reply | Private Reply | To 1 | View Replies]

To: ~Kim4VRWC's~; 1234; 5thGenTexan; AbolishCSEU; Abundy; Action-America; acoulterfan; AFreeBird; ...
The Apple Security Update for macOS 10.13.1 High Sierra that was released this morning will be automatically pushed out and installed on all connected vulnerable Macs with High Sierra installed. Apple is apologizing to all users they have put at risk with this egregious mistake and is announcing they are revising their auditing process for future software releases. — PING!


Apple Pushes Out Security Update and
Apologizes To Users
Ping!

The latest Apple/Mac/iOS Pings can be found by searching Keyword "ApplePingList" on FreeRepublic's Search.

If you want on or off the Mac Ping List, Freepmail me

3 posted on 11/29/2017 3:56:58 PM PST by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you racist, bigot!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: GraceG
Government Deep State API exposed...

. Apple chutzpah exposed...

4 posted on 11/29/2017 3:57:17 PM PST by BwanaNdege ("The church ... is not the master or the servant of the state, but the conscience" - Luther)
[ Post Reply | Private Reply | To 2 | View Replies]

To: GraceG
Government Deep State API exposed...

Nope, too obvious.

5 posted on 11/29/2017 3:58:02 PM PST by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you racist, bigot!)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Swordmaker

Whats this mean to me a regular non business iMac owner that recently upgraded to the High Siera 10.13.1

Dont know why i do these updates and should stop


6 posted on 11/29/2017 4:03:47 PM PST by CGASMIA68
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker
Amusing. From https://forums.developer.apple.com/thread/79235:

Note: This solution might be specific to High Sierra

 

Try this:

Solution 1:

On startup, click on "Other"

Enter username: root and leave the password empty. Press enter. (Try twice)

If you're able to log in (hurray, you're the admin now), then head over to System Preferences>Users & Groups and create a new Admin account.

Now restart and login to the new Admin Account (you may need a new Apple Id). Once you're logged into this new Admin Id, you can again proceed to your System Preferences>Users & Groups. Open the Lock Icon with your new Admin ID/Password. Assign "Allow user to administer this computer" to your original Apple ID. Restart.


Now login with your original Apple Id. (In case you wish to remove the "Other" login option on startup read this: https://support.apple.com/en-in/HT204012

 

Solution 2:

If you're unable to login at startup using username: root and empty password, then login with your existing account (standard user).

Again, head over to System Preferences>Users & Groups. Click on the Lock Icon. When prompted for username and password, type username: root and leave the password empty. Press enter. This might throw an error, but try again immediately with the same username: root and empty password. This should unlock the Lock Icon. If it does, try Solution 1 next.

 

P.S. Solution 2 worked for me. No idea how or why. Hope this helps.


7 posted on 11/29/2017 4:05:55 PM PST by cynwoody
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

Disregard my last post. I just went in and see the security update availability. Reason for my post was I looked this AM and didnt see it. Its there now


8 posted on 11/29/2017 4:06:59 PM PST by CGASMIA68
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker
https://twitter.com/lemiorhan/status/935578694541770752

Hacker News discusses the above here.

9 posted on 11/29/2017 4:15:42 PM PST by cynwoody
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker
Same old story - upper management thinks it can will away the fact that resources x time = scope x quality.
10 posted on 11/29/2017 4:18:44 PM PST by NobleFree ("law is often but the tyrant's will, and always so when it violates the right of an individual")
[ Post Reply | Private Reply | To 1 | View Replies]

To: NobleFree

And it’s amazing how much of upper management never read The Mythical Man-Month.


11 posted on 11/29/2017 4:25:22 PM PST by FreedomPoster (Islam delenda est)
[ Post Reply | Private Reply | To 10 | View Replies]

To: Swordmaker

12 posted on 11/29/2017 4:31:20 PM PST by Pollard (TRUMP 2020)
[ Post Reply | Private Reply | To 1 | View Replies]

To: CGASMIA68

Whats this mean to me a regular non business iMac owner that recently upgraded to the High Siera 10.13.1

Dont know why i do these updates and should stop


No, don’t stop. In fact if you upgraded to 10.13.1, launch the App Store app and go to the updates section. Apple just released a security patch update to fix this High Sierra security problem.

It seems to be the case with all software as it versions forward; things get fixed and things that were fixed get broken. You want to live with a software release that is pretty current, as a lot of software just won’t run if you’re using an OS that is too old.

On the other hand, you might not want to live right on the very latest release the moment it is released. No matter how much release testing is done, once a new version is released to the public that’s when the real testing begins with the myriad configurations running out in the real world.

Personally, after a major software release, like 10.13, I like to hang back for a few months to see how the release works in the real world. I was almost actually going to make the jump from 10.12.6 to 10.13.1, figuring there had already been the .1 upgrade within 10.13. In this case the .1 upgrade introduced the bug. *sigh*


13 posted on 11/29/2017 4:41:24 PM PST by Flick Lives (The FBI is a taxpayer funded Mafia organization)
[ Post Reply | Private Reply | To 6 | View Replies]

To: Flick Lives

Thanks I looked this AM and saw no Sec Update and figured it didn’t affect me. Went in just after my post and saw the update and completed it a few minutes ago.


14 posted on 11/29/2017 4:45:04 PM PST by CGASMIA68
[ Post Reply | Private Reply | To 13 | View Replies]

To: CGASMIA68

Thanks I looked this AM and saw no Sec Update and figured it didn’t affect me. Went in just after my post and saw the update and completed it a few minutes ago.

Excellent! Now you’re all set.


15 posted on 11/29/2017 5:06:05 PM PST by Flick Lives (The FBI is a taxpayer funded Mafia organization)
[ Post Reply | Private Reply | To 14 | View Replies]

To: CGASMIA68

By the way, the notes on any update will give you a synopsis of what is in the update. The update you just installed was likely labeled “recommended security update” or words to that effect.


16 posted on 11/29/2017 5:09:01 PM PST by Flick Lives (The FBI is a taxpayer funded Mafia organization)
[ Post Reply | Private Reply | To 14 | View Replies]

To: CGASMIA68
Dont know why I do these updates and should stop

Because the hackers who are out there are not really after the businesses. They are after your computer. . . and the updates always contain more security updates and improvements that keep your computer safe from those hackers than stupid mistakes like this especially idiotic one which really did not put you at all at risk from any of them because it required anyone who wanted to exploit it have physical access to your iMac.

17 posted on 11/29/2017 8:52:09 PM PST by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you racist, bigot!)
[ Post Reply | Private Reply | To 6 | View Replies]

To: Swordmaker

This is on the level of the Adobe Creative Cloud snafu about a year ago, where anything put in the topmost/foremost folder of all folders on your computer disappeared forever after a very short period of time.

A user in my group was panicked as all their latest work (important stuff) was just disappearing.

Found out they simply made a folder labeled something like ‘ LATEST_WORK’ (note the three spaces in front of the spelling) on their Desktop and was putting their latest files there as a quick access. They named it that way so it would aways be at the top of any list of folders.

Sure enough, they put files in there…and down the “Memory Hole” they went. Literally!

Not knowing WHY it was doing that, I told them to please use another folder and leave that one empty until I could figure out what was wrong and causing it. Shortly after that, Adobe announced the problem, how to identify it, and patched it. Geez.

And now Apple announces that they key to the front door is right under the welcome mat! GAH!!!


18 posted on 11/29/2017 9:04:49 PM PST by BradyLS (DO NOT FEED THE BEARS! I)
[ Post Reply | Private Reply | To 1 | View Replies]

To: BradyLS

…That’s like…

PASSWORD: 123456

…level of bad.


19 posted on 11/29/2017 9:05:56 PM PST by BradyLS (DO NOT FEED THE BEARS! I)
[ Post Reply | Private Reply | To 18 | View Replies]

To: cynwoody
Amusing. From https://forums.developer.apple.com/thread/79235:

Yup, that post from Chethan177 does exist on an Apple Developers' Forum, cynwoody. . . but if you read all of the rest of the 225 posts related to the original post, which I have, it was in an essentially finished topic thread from a Developer named Taylor E posting seeking help back on June 8, 2017, almost six months ago, when Taylor E, it turns out, had somehow gotten his Admin User's credentials fouled up.

Apple employees would never have seen this comment by Chethan177, unless some member of the forum actually reported it.

Why is that?

There are literally thousands of these topic posts on Apple Developers' Forums, Cynwoody. Thousands. These particular Apple Developers' Forums are not-moderated-by-Apple forums, meaning Apple pays no attention to them. They are for independent Apple developers to provide community help for each other without Apple employee input. They're intended for the community of independent developers to provide assistance to other Apple developers who run into problems utilizing the experience and knowledge of other developers willing to share solutions. The reason Apple does not even look at it is due to legal liability where developers may be working independently on something Apple itself may also be also developing in house.

Chethan177, not noticing that Taylor E's problem had long since been resolved, posted his comment and suggestions three nested comments deep two weeks ago. In fact, Cynwoody, until yesterday, Chethan177's comment of November 13, 2017, WAS THE LAST COMMENT IN THE THREAD! All following comments relative to Chethan177's were made after November 28th when someone made a search of Apple forums for anything related to Root access.

Yesterday, on November 28th, after the Root Exploit had been exposed to the world, CoyoteDen jumped in. . . which was BEFORE it was first a topic on Reddit.

Chethan177 later says that he was totally unaware that it was a Root exploit, but he merely thought it allowed access to the Admin user, until the other commenters point it out to him There were a couple shocked comments by others starting on November 28, 2017, that it allowed Root access and shouldn't. But no one commented contemporaneously that Apple should have been notified because no one commented on Chethan177's comment at the bottom of the thread because the evidence shows that essentially NO ONE READ HIS COMMENT before November 28th.

There were no contemporary comments made right after Chethan177's original posting on November 13, 2017.

I think they are ALL forgetting that this particular set of forums were NOT moderated or even read by Apple, and figured Apple should have jumped on it. . . but since it was not moderated or even visited, it was not.

CoyoteDen (Nov 28, 2017 6:31 PM): Aaaand it’s all over Twitter, Reddit, and hacker news. Guess someone else either discovered it or they found this thread.

If you notice, the REST of the comment about it being on Twitter, Reddit, and hacker news were all made YESTERDAY, on November 28, 2017. . . because that's when even THEY noticed this. Someone went and did a search of the Apple Forums for any comments on this and found it. . . so, no, it was NOT all over any of these forums before yesterday when it was formally discovered.

20 posted on 11/29/2017 10:38:17 PM PST by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you racist, bigot!)
[ Post Reply | Private Reply | To 7 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-29 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson