On macOS 10.13.1, run the following command:
#APPLE SECURITY UPDATE 2017 UPDATE#
If Security Update 2017-001 for 10.13.0 has been installed has been installed, the following output should be returned:Ĭomputername:~ username$ pkgutil -packages | grep .os.10.13Supplemental.17A501Ĭom.10.13Supplemental.17A501 Pkgutil -packages | grep .os.10.13Supplemental.17A501 On macOS 10.13.0, run the following command: If you need to verify via the command line that Security Update 2017-001 has been installed, use the procedure shown below: The double listing for Security Update 2017-001 means both releases of Security Update 2017-001 were installed.
#APPLE SECURITY UPDATE 2017 MAC#
If your Mac received both versions of Security Update 2017-001 for 10.13.1, the list of installed updates in the MAS may look a little odd. To address and fix the file sharing issue, Apple has released an updated Security Update 2017-001 for 10.13.1, which is being installed on both still-vulnerable Macs and also on Macs which had received the first release of Security Update 2017-001 for 10.13.1. Something to be aware of is that the initial release of Security Update 2017-001 for 10.13.1 had a problem where file sharing did not work following the installation of the update. If it has been installed, it should show up in the list of installed updates. If it hasn’t been automatically installed yet, it should appear as an available update. To verify that Security Update 2017-001 has been installed, you should be able to check the Updates page of the Mac App Store (MAS).
This update is being deployed using the same automated installation mechanism that Apple previously used to deploy OS X NTP Security Update 1.0 back in 2014, where Security Update 2017-001 is being silently downloaded and installed on vulnerable Macs.įor more details, please see below the jump.
To fix the vulnerability popularly referred to as #IAMROOT, Apple has begun pushing Security Update 2017-001 to Macs running the following OS versions: