Apple Issues Patches For 25 Security Holes 241
TheCybernator writes "Apple today released software updates to plug more than two dozen security holes in its Mac OS X operating system and other software. The free patches are available via the Mac's built-in Software Update feature or directly from Apple's Web site.
All told, today's batch fixes some 25 distinct security vulnerabilities, including a dangerous flaw present in the AirPort wireless devices built into a number of Apple computers, including the eMac, the iBook, iMac, Powerbook G3 and G4, and the Power Mac G4. Apple said computers with its AirPort Extreme wireless cards are not affected.
Earlier this month, Apple released a software update to fix a vulnerability in its wireless router, the AirPort Extreme Base Station. That update and instructions on how to apply it are available at the link."
Comment removed (Score:3, Insightful)
Why (Score:2, Insightful)
Re:Quick summary to avoid reading TFA (Score:5, Insightful)
That's the beauty of Open Source (from Apple's POV).
When things go well: Hey - look at us! We 'support' OSS by leveraging all that free software.
When things go bad: Oh well - it's MIT's software! Not ours...
Seriously - I for one am really glad that one closed O/S vendorout there lets OSS do the heavy lifting security wise on their products. Apple users are left in a far less leaky boat. Thanks MIT, Thanks FOSS, Thanks Apple!
Re:MS flaws = bad, Apple flaws = good...? (Score:2, Insightful)
Basically saying, "I'm not screwing the sheep. I'm Merely helping it through the fence."
Re:Why (Score:5, Insightful)
Yes, some Windows folks will see this as a "haha" nelson moment. However, it isn't a haha moment until the headline reads that someone found 25 Apple exploits and released a huge virus to exploit them. And while I am firmly planted in my Windows environment, I will not be interested in laughing at my Apple compadres when or if that happens.
Re:but ... (Score:5, Insightful)
The Mac ads clearly referred to all the viruses, worms, spyware, etc. Which are VERY common on Windows PCs, and for whatever reason, are very uncommon on Macs. (I don't really care why they are not prevalent on Macs, I just care that my MacBook Pro is free of exploits, as are my Linux servers.)
Patched bugs are a good thing. Bugs are practically unavoidable. Unpatched bugs, as evidenced by rampant exploits, are the real problem.
Not news... (Score:2, Insightful)
Comment removed (Score:3, Insightful)
Re:I'll tell you what's news: (Score:4, Insightful)
I don't do IT, so maybe releasing 25 fixes at once can require 25 separate test cycles. Anybody care to enlighten me?
Re:Cue Apologists (Score:3, Insightful)
As my CS professor said once, "With Windows, you know it's broken right up front, and that you have to take certain steps right away to fix it. such as slap an AV program on. With the various Unix-based OSes, you have to go over every little detail with a fine-toothed comb, putz around in the code, recompile, and all of that other hassle because they put the Root into Rootkit."
If you ask me, the only botnet secure OS is the one not sitting with an allowed/established connection to the internet to begin with. If it's human-created code, it's vulnerable, period.
Comment removed (Score:2, Insightful)
Re:I'll tell you what's news: (Score:5, Insightful)
Sigh. Have you ever worked in the software development industry. There is this thing called "testing" that some people find important. If you work on Kereberos and find a bug and patch it, you then test just it before distributing. If you work at Apple or Redhat where you are shipping an entire OS with a bunch of packages, it is impossible to patch and test those patches in conjunction with all other hardware in the same timeframe because you have multiple things to patch at once. Thus, the only real solution s to do it in bundles, where you stick a group of patches together then QA them all at once. This results in longer delays for some fixes, but it also means the patch is actually tested in conjunction with the other patches so one does not break another. Any responsible vendor uses this method for dealing with bugs.
Individual developers roll out patches and you could have patched your OS X box from them if you felt it was an emergency for you. As for what Linux vendors do, I don't know of any who roll one-off fixes into the stable branch intended for real use, instead of testing patches in bundles. You don't seem to know what you're talking about.
Re:Quick summary to avoid reading TFA (Score:5, Insightful)
Re:I'd like to propose a tag (Score:3, Insightful)
It means that the designer specifically designed the device to not do something that is normally expected or wanted, or has been designed in such a way as to annoy the user constantly. In other words, they had to work harder to make sure the device did not work. Typical MS things that are defective by design are DRM, Clippy, and that new security thing in Vista that is so annoying.
Ah. So you mean like a media player that can't display full screen videos ?
(It would be interesting to see what you thinkg DR, Clippy and UAC are stopping you doing that is "normally expected", as well.)
Re:Cue Apologists (Score:2, Insightful)
If you think the two are the same, it's no wonder you think they're all fanboys.
Re:Quick summary to avoid reading TFA (Score:2, Insightful)
I administer a network of 50 systems and the only thing protecting those machines is that I don't allow users to execute downloaded software.
Any program which issued those malformed instructions while claiming to allow the users to punch the monkey or something could install the first OS X backdoor worms, installing them with root privileges then effectively hiding themselves.
This flaw allows exactly the same attack as the P2P "hot_teen_action.mpg.exe" trojan scams on OS X - which is supposed to be secure against that kind of attack because it requires an administrator password to obtain higher than user-level access to the machine.
Telling users that this is serious and dangerous is certainly not spreading FUD, it's just getting them to stop ignoring the Jack Russel Terrier update icon.
Re:Why is this news? (Score:2, Insightful)
Because Microsoft has a lot more to patch.