

Apple had already issued a rare apology for the "root" security flaw, writing that its "customers deserve better" and promising to audit its development practices to prevent similar bugs in the future. And worse, two of those Mac users say they've also tried re-installing Apple's security patch after that upgrade, only to find that the "root" problem still persists until they reboot their computer, with no warning that a reboot is necessary.īut the shoddiness of Apple's patch joins a disturbing pattern of security missteps in High Sierra's code.

Is firefox fixed yet for mac? install#
Those who had not yet upgraded their operating system from the original version of High Sierra, 10.13.0, to the most recent version, 10.13.1, but had downloaded the patch, say the "root" bug reappears when they install the most recent macOS system update. Apple's initial patch came out about a 18 hours after the bug was first reported.īut now multiple Mac users have confirmed to WIRED that Apple's fix for that problem has a serious glitch of its own. Except, perhaps, when that patch is so rushed that it's nearly as buggy as the code it was designed to fix.Įarlier this week, Apple scrambled to push out a software update for macOS High Sierra, to sew up a glaring hole in the operating system's security measures: When any person or malicious program tried to log into a Mac computer, install software, or change settings, and thus hit a prompt for a username and password, they could simply enter "root" as a username, no password, and bypass the prompt to gain full access to the computer. When a company like Apple rushes out a software patch for a critical security bug, it deserves praise for protecting its customers quickly.
