Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
I really feel these glaring software bugs are endemic of an industry that is using automated testing more in lieu of human testers.

You have it backwards. Human testers would never have found this. In fact, that is what automated testing is-- once a human thinks to test the product certain way, that sequence is captured and automated.

In this particular case, the user had to go through a specific sequence in terms of cursor placement and keystroke entry. Unless the human is following a specific detailed script (which they wouldn't be-- since anything scripted would immediately be automated), it is completely arbitrary whether they would go through the exact sequence required to trigger this bug.
 
  • Like
Reactions: bobob
How embarrassing...

I wish Apple did a better job testing their releases. We used to enjoy such high quality when it came to software updates and releases.
Discussed this at work. There’s zero chance that testing would find that kind of problem. This is a problem with the development process.
 
  • Like
Reactions: bobob
You ever heard of Windows? Perhaps you should read up on that OS if you haven't.

Also, give me a break. Nobody finds everything, not even "Apple". Patched quickly and painlessly. Move along.

But if you take away complaining how else can MacRumors members express their hyperbolic self-righteousness?
 
Did Apple dissolve it's MacOS QC division back in 2012 or something?
This "do a buncha betas" scheme is not working.
 
Wow....that is surprising. Most user will never login as root on their MAC.
But why would it have ever been set to blank?

The password was blank because root login is disabled by default in macOS. This bug was improperly enabling it without going through the steps of creating a proper root account.
 
You have it backwards. Human testers would never have found this. In fact, that is what automated testing is-- once a human thinks to test the product certain way, that sequence is captured and automated.

In this particular case, the user had to go through a specific sequence in terms of cursor placement and keystroke entry. Unless the human is following a specific detailed script (which they wouldn't be-- since anything scripted would immediately be automated), it is completely arbitrary whether they would go through the exact sequence required to trigger this bug.

Still, this mistake by Apple is amateurish. Checking for lack of passwords for pre-installed admin level accounts like this (that are not a part of the first power-on setup sequence) is one of the first things that any test bucket should include, automated or no.

The fact that a company like Apple was not checking for this is completely facepalm-worthy.
 
I wonder if Apple being able to quietly force updates onto deployed Macs is in itself a security/privacy concern? It could mean Apple potentially being able to force a change on the OS anytime they wanted to, perhaps some third-party actor might be able to take advantage of that update system or that a government could compel Apple to use that update system to make changes to users computers.

It's a System Preference you can easily disable. In fact, I believe it first shows up as an opt-in. I had mine disabled for a long time before I finally decided convenience was more important to me than that bit of security. But, it's certainly a sound decision to disable it or refuse it.
 
  • Like
Reactions: commander.data
I'm on the beta so am not getting this update - plus I'm not affected anyway as I have an enabled root user and a decent password. But I'm curious ... is this update disabling the root user even if it's enabled? I use mine quite regularly and I'll probably get confused as to what's going on before I remember to re-enable it if that's the case.
 
Again - what that have to do with Samsung?

Do they have operating system or would the add be in reference to Samsung PCs?

Still not relevant to any product that they sale.

Regularly makes ads that tout it's superiority to Apple often making fun of Apple users. The ads have been aimed at iPhone vs. Samsung phones. The original OP's point was in reference to this.
 
  • Like
Reactions: bobob
Still, this mistake by Apple is amateurish. Checking for lack of passwords for pre-installed admin level accounts like this (that are not a part of the first power-on setup sequence) is one of the first things that any test bucket should include, automated or no.

The fact that a company like Apple was not checking for this is completely facepalm-worthy.

As I understand the bug, it's not a lack of a password. It's a blank password. There's a big difference in terms of the user sequence. You actually have to place the cursor in the password space as if you are going to type a password.
 
That was a quick turnaround to patch up for the security vulnerability, look like this is real important issue.

Now my question - how do I check the log who is trying to take advantage of this security loophole?
 
That was a quick turnaround to patch up for the security vulnerability, look like this is real important issue.

Now my question - how do I check the log who is trying to take advantage of this security loophole?

I didn't turn much up (anything, actually) looking at the Console just now but you can start by narrowing the list of "who" to anyone who had physical access and a login in the last 24 hours.
 
  • Like
Reactions: MacWorld78
Apple under Steve Jobs/Scott Forstall:

"...It just works"

Apple under Tim Cook/Jony Ive:

"...It might work...some day..."
 
Still, this mistake by Apple is amateurish. Checking for lack of passwords for pre-installed admin level accounts like this (that are not a part of the first power-on setup sequence) is one of the first things that any test bucket should include, automated or no.

The fact that a company like Apple was not checking for this is completely facepalm-worthy.

So here's the thing, I agree that there's a definite WTF moment here. But I don't agree with what the answer should be. OS X has shipped with a disabled root account with no password since 10.0. This is not new, and if that by itself was a problem, we'd be hitting this much sooner, not nearly 2 decades later.

To be able to use root, you have to elevate using an admin account's credentials in this state. That's actually not bad practice (and is common on Linux systems). The real WTF in my mind here is that this piece of code had the permissions required to be able to enable root without also requiring the admin account's credentials to elevate. That tells me that this elevation dialog itself is running elevated code, and would be a great point of attack if you can get it to do arbitrary things, like the flaw demonstrated here. That is a giant WTF to me.
 
  • Like
Reactions: Mescagnus
Does anyone have the link to download the file .pkg for mass deployment?
You should not have to mass deploy.
"This morning, as of 8 a.m., the update is available for download, and starting later today it will be automatically installed on all systems running the latest version (10.13.1) of macOS High Sierra. "
 
Please do tell ...... seriously.... realised you were a photographer , though did not know you moonlighted in developwment . I've been in software development for 17 years, please explain to me how reaction to this is knee-jerk? And while you are there, what priority of bug is this ?

Clearly apple are fools, cause thier reaction was knee-jerk and a patch is out already.... ;)

I'm so intrigued ....

That particular response was knee-jerk in nature.

So all of software you have developed/tested over your 17 years, at the scope similar to a major operating system, was delivered 100% bug-free? Tell me more...

With respect to my photography and engineering background, you may not know some people have had multiple careers.
 
currently running MacOS 10.13.2 beta 4 public
now eagerly awaiting security patch

I tried this and was able after a couple of attempts to gain access to login options for example - though not sure how a third party would access this unless i handed over my laptop whist logged in and screen active.

That said, this is a surprise!

I wonder why it takes a few tries to succeed with ID root and a blank password? It hasn't worked first time in the few attempts I've made just now.
 
Even though this update did not require a restart, I restarted anyway. After the restart, I was prompted to accept/not accept analytics sharing, then the standard "setting up your computer" message came up, then everything was back to normal. Did this happen to anyone else following a restart, AFTER installing the update?

Same thing happened to me.
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.