Security

Patches

Apple pushes first-ever 'rapid' patch – and rapidly screws up

Maybe you're just installing it wrong?


Apple on Monday pushed to some iPhones and Macs its first-ever rapid security fix.

This type of patch is supposed to be downloaded and applied automatically and seamlessly by the operating system to immediately protect devices from exploitation, thus avoiding the usual system update cycle that users may put off or miss and thus leave their stuff vulnerable to attack.

As luck would have it, though, this first-of-its-kind patch didn't go off without a hitch. Some Cupertino fans reported problems actually getting the update.

"iOS Security Response 16.4.1 (a) failed verification because you are no longer connected to the internet," was the commonly reported failure message from the operating system, although users typically were able to apply the security update after a try or two.

Also: Apple hasn't released any notes alongside the rapid patch nor if the update patched a vulnerability that miscreants have already found and exploited. And as security analyst Will Dormann asked, will the bug(s) will eventually be assigned CVEs? 

Considering that some recent iOS and macOS updates covered zero-days that had already been exploited by snoops to deploy spyware on victims' devices, it's a good idea not to wait on installing this one latest fix, even if the installation process takes longer than it should.

Here's what we do know about the iGiant's first-ever "Rapid Security Response," according to Apple's May 1 advisory:

Rapid Security Responses are a new type of software release for iPhone, iPad, and Mac. They deliver important security improvements between software updates — for example, improvements to the Safari web browser, the WebKit framework stack, or other critical system libraries. They may also be used to mitigate some security issues more quickly, such as issues that might have been exploited or reported to exist "in the wild."

Note: the quotation marks around "in the wild" are Apple's, not ours.

Also, Apple only pushes these new quick fixes to the latest versions of iOS, iPadOS and macOS beginning with iOS 16.4.1, iPadOS 16.4.1, and macOS 13.3.1. Customers with more venerable software will have to wait for normal software updates.

These latest fixes are supposed to be applied automatically by default (assuming they work), and once the update has been verified, it's denoted by a letter after the numbers, ie: macOS 13.3.1(a). 

If you turn off this default setting (probably a bad idea in the long run), your device will receive the fixes when they are included in a regular OS update. ®

Send us news
43 Comments

Apple slaps patch on WebKit holes in iPhones and Macs amid fears of active attacks

Two CVEs can be abused to steal sensitive info or execute code

Goldman sacked: Apple 'wants out' of credit card collab

Don't be too shocked: Financial giant has been fleeing normie banking lately after failing to find footing

The 15-inch MacBook Air just nails it

Vast battery life, zippy performance, and rich speakers make an impressive package

US senator claims Google and Apple reveal push notification data to foreign govs

Cupertino promises to reveal its data deliveries, ending silence on the matter

Steve Jobs' $4.01 RadioShack check set to fetch small fortune at auction

Talk about inflation – bids are now closing in on $30K

Dump C++ and in Rust you should trust, Five Eyes agencies urge

Memory safety vulnerabilities need to be crushed with better code

Open source forkers stick an OpenBao in the oven

HashiCorp software faces challenge after licensing change

Polish train maker denies claims its software bricked rolling stock maintained by competitor

Says it was probably hacked, which isn't good news either

Two years on, 1 in 4 apps still vulnerable to Log4Shell

Lack of awareness still blamed for patching apathy despite it being among most infamous bugs of all time

Weak session keys let snoops take a byte out of your Bluetooth traffic

BLUFFS spying flaw present in iPhones, ThinkPad, plenty of chipsets

Atlassian security advisory reveals four fresh critical flaws – in mail with dead links

Bitbucket, Confluence and Jira all in danger, again. Sigh

Duke Uni libraries decamp from 37Signals' Basecamp over CTO's blogs

We're canceling our subscriptions, say librarians citing co-founder's views