Posted on 01-23-2018 10:35 AM
Security update info: https://support.apple.com/en-us/HT208465
Posted on 01-23-2018 10:48 AM
As usual, it takes Apple 2-3 days to make the Updates available for download...
Posted on 01-23-2018 11:19 AM
Hopefully finder crash be gone!
Posted on 01-23-2018 12:37 PM
Beside keep each other posted if the 10.13.3 update package is available!
Posted on 01-23-2018 01:20 PM
FYI Build Numbers of 2018-001 patched machines
10.11.6 = 15G19009
10.12.6 = 16G1212
Posted on 01-23-2018 01:55 PM
Posted on 01-23-2018 02:04 PM
Thanks!
Posted on 01-23-2018 02:19 PM
no download url for 10.12 Sierra Security Update 2018-001?
Posted on 01-23-2018 02:19 PM
Great, now we just need Apple to provide a fix for 3rd party SSD drives that fail when encrypted. #submitted
Posted on 01-23-2018 02:35 PM
Anybody having trouble installing 10.13.3 on an iMac Pro? I tried 4 times (15 mins each, pretending to install the update) but after logging on it's still on 10.13.2.
Posted on 01-23-2018 03:10 PM
2018-001 Sierra:
https://support.apple.com/kb/DL1956?viewlocale=en_US&locale=en_US
2018-001 El Capitan:
https://support.apple.com/kb/DL1955?viewlocale=en_US&locale=en_US
Posted on 01-23-2018 04:41 PM
Question i am working to block this update for systems that are running 10.12.6. The reason is because the systems in our environment run Carbon Black and the current version we have installed is not compatible and causes Kernel Panics.
The user would attempt to log back in to their system and a kernel panic message will come up preventing the user from logging in.
I am trying to utilize what i had running for 10.13.2 upgrade in a policy to block the files if downloaded awaiting installation
Files and Processes
SEARCH FOR FILE BY PATH Full path to the file
/Library/Updates/091-52053/
The bold section is what works for 10.13.2 i would like to know the name for 10.12.6
Posted on 01-23-2018 05:10 PM
@bjones , however you want to deploy it, run this command on macOS 10.12.6 (and OS X 10.11.6) Macs: softwareupdate --ignore "Security Update 2018-001"
. That will make Apple Software Updates ignore that update.
Posted on 01-23-2018 05:25 PM
Does anyone know what extension attribute we can use to identify Macs that have installed these patches? I can see them if I go to the System Information app, and look in the Installation item under Software, so I would think I could pull that info out using system_profiler, but when I try to grep for the update running system_profiler SPApplicationsDataType
I can't seem to find the update on a system I know applied it.
Posted on 01-23-2018 06:20 PM
Posted on 01-23-2018 06:45 PM
@pcrandom perfect thanks i have that going so far but i am trying to remove for systems that have it cached.. By any chance do you know what the folder name is under /Library/Updates/ that it creates? This is for those that got passed the block.
Posted on 01-23-2018 06:48 PM
Posted on 01-23-2018 08:46 PM
@bjones It's /Library/Updates/091-62747.
Also, if you have Macs that already applied the update and are kernel panicking, and you can't boot into Safe Mode or Single User Mode to remove Carbon Black Response or Carbon Black Protect, I figured out the files that need to be removed before the Mac can boot normally:
For Response, delete:
/Library/Extensions/CbOsxSensorNetmon.kext
/Library/Extensions/CbOsxSensorProcmon.kext
/Library/LaunchDaemons/com.carbonblack.daemon.plist
/Applications/CarbonBlack/CbOsxSensorService
For Protect, delete:
/Library/Extensions/b9kernel.kext
/Library/LaunchDaemons/com.bit9.Daemon.plist
/Applications/Bit9/Daemons/b9daemon
You can either Target Disk Mode the affected Mac and delete from Finder using a working Mac, or you can boot into Recovery partition and use Terminal to delete. After removing those files, the Mac should be able to start up without kernel panicking, and the uninstall scripts for each product still remain, which you can then run in Terminal:
sudo /Applications/CarbonBlack/sensoruninst.sh
and/or
sudo /Applications/Bit9/uninstall.sh
Posted on 01-24-2018 12:26 AM
@dgreening Thanks mate!