Mac owners who are still running macOS High Sierra 10.13 and who have already installed Apple's on that version of the operating system will need to install it once again upon upgrading to macOS 10.13.1, reports. Security researchers running a patched version of the original macOS High Sierra update, 10.13.0, told Wired that the root bug was reintroduced upon installing the macOS 10.13.1 update.
Adobe Captivate 8 patch for Mac and Windows. Adobe Captivate 8 users can now install and use Adobe Captivate on Mac and Windows. Ensure that you are on build 8.0.0.145 before downloading and installing the patch. After downloading the DMG file, double-click the file to install the patch.
After updating, they needed to install Apple's security patch again. Even that didn't fix the issue until their machines were rebooted. Those who had not yet upgraded their operating system from the original version of High Sierra, 10.13.0, to the most recent version, 10.13.1, but had downloaded the patch, say the 'root' bug reappears when they install the most recent macOS system update. And worse, two of those Mac users say they've also tried re-installing Apple's security patch after that upgrade, only to find that the 'root' problem still persists until they reboot their computer, with no warning that a reboot is necessary.The root fix, for macOS High Sierra 10.13.0 and 10.13.1, addresses a serious vulnerability that was a day earlier on Tuesday.
The bug enabled the root superuser on a Mac with a blank password and no security check, letting anyone bypass the security of an admin account with the username 'root' and no password. While the security update successfully fixes the issue, it appears Apple may not have releases a modified and patched version of macOS 10.13.1, so customers who installed the update on 10.13 might think they're protected upon updating to 10.13.1, but they're not. Instead, the bug is fully re-introduced.
Apple may fix this problem now that the oversight has been pointed out, but in the meantime, customers upgrading from macOS High Sierra 10.13 to 10.13.1 should make sure to download the security update a second time and restart to be certain the root vulnerability is patched. This won't be an issue when the macOS High Sierra 10.13.2 update is released, as Apple in the macOS High Sierra 10.13.2 beta that was released this morning. How much worse can High Sierra get?
![What Is The Fix For Running Captivate 8 On Mac High Sierra? What Is The Fix For Running Captivate 8 On Mac High Sierra?](https://elearning.adobe.com/files/2018/01/cp2-500x354.png)
27 pages of people with this issue. I've noted it as well and it is quite serious. I setup a new Mac Pro and updated it to High Sierra. It crashed constantly. Got a replacement unit from the vendor. It came with High Sierra already installed and does the exact same thing.
It seems to be exacerbated if you have numerous windows open and multiple high resolution displays. There was a reason why Steve Jobs gave up on the yearly OS X updates.
It forced shoddy releases. They need to go back to releasing OS X version when they are ready. Not to hit a yearly mark.
The best OS is one you don't even notice is there. I don't excuse Apple for this one, but I have a hard time getting worked up over it. This bug brings the current version of MacOS (unpatched) to the level of Windows without UAC enabled, which is basically the norm. After that, I really don't intend to allow others physical access to my systems to exploit this. Seriously, we can stop the arm waving For the typical home computer, this is not a real big concern. For computers in shared environments, or in environments where the users are given limited privileges, this is a huge problem.