Security update 2006 v1.1

The Security Update 2006 v1.1 has been released but the automatic update of Mac OS X don't propose anything to do!!! Should i do the update with the file present in the section "download" in Apple website?? or maybe this update don't concern my computer???
PS : I have done the first security update properly (the update just previous the v1.1)

The ability to launch Safari is not a 100% accurate method for checking if Safari has been patched with Security Update 2006-002 (v1 or v1.1).
I am one of the users that needed the v1.1 update, because I had moved Safari into a sub folder. However, after patching with the version 1 updater, I was still able to use Safari without difficulty, by launching from the dock, which is the method I use 100% of the time.
It was only this morning when I realized that the v1.0 and the v1.1 update didn't patch the Safari version.
The symptoms of an unpatched Safari version are:
1. Links from Mail.app won't launch Safari. They will open a new window if Safari is open.
2. A 2.1 MB Safari app is in the Applications folder, but when clicked, does nothing.
3. A 28 MB Safari app is in your subfolder (where you moved it), but isn't version 417.9.2.
No doubt, this is due to me failing to RTFM. But, Apple should simply have made the v1.1 updater look for a 2.1 MB Safari.app application in the Application folder, and trash it, or at a minimum notify the user with a pop-up message, IMHO.
So, Riad, if you want to be assured that your Safari.app is patched, you should launch it, and select Safari->About Safari and verify the version is 417.9.2 (on Intel...don't know if the version is the same for PPC).
iMac Duo 20" | 2 GB | 256 MB Video   Mac OS X (10.4.5)   Smokin' fast and sweet

Similar Messages

  • Apple Releases Security Update 2006-004 (PowerPC and Intel)

    From Macfixit................
    Apple has released Security Update 2006-004 for Mac OS X in both PowerPC and Intel versions. This update requires Mac OS X 10.4.7 for either PowerPC or Intel, Mac OS X 10.3.9 or Mac OS X 10.3.9 Server.
    This is the fourth major standalone security update for Mac OS X released this year.
    Update procedure recommendation First, avoid performing any other operations (in Mac OS X or third-party applications) while the update process is occurring. In addition, before installing this security update, make sure all Apple-installed applications and utilities are in their original locations. Moving one of these applications to a different location on your hard drive can lead to an incomplete update. Also, disconnect any FireWire/USB devices before applying the update (except for your startup drive, if it is FireWire or USB, and your keyboard/mouse), then re-connect the devices one by one (checking for issues created by any particular device) after the update process is complete and the system has restarted.
    Enhancements in this release
    Of most interest to general end-users:
    a fix that prevents maliciously crafted Zip archives from causing condition where arbitrary code can be execute. In other words, prior to Security Update 2006-004 you could download a specially crafted file ending in .zip from a Web site or other location, and it could trigger the execution of malicious code.
    a fix that disallows maliciously crafted Canon RAW images from creating a buffer overflow, potentially leading to arbitrary code execution. Prior to Security Update 2006-004, you could download or otherwise receive a Canon RAW file that could allow execution of malicious code on your system.
    similar to the above, a fix that prevents maliciously crafted GIF images from causing an integer overflow, potentially leading to arbitrary code execution.
    new download validation that will catch certain HTML files defined by Safari as "safe" that may actually contain malicious JavaScript code. After applying Security Update 2006-004, these files will not be automatically opened.
    Protection against maliciously crafted HTML documents that can also open the door for arbitrary code execution by accessing deallocated objects.
    A full list of enhancements is as follows:
    AFP Server
    An issue in the AFP server allows search results to include files and folders for which the user performing the search has no access. This may lead to information disclosure if the names themselves are sensitive information. If the permissions of the items allow it, the contents may also be accessible. This update addresses the issue in Mac OS X v10.3.9 by ensuring that search results only include items for which the user is authorized. For Mac OS X v10.4 systems, the issue was addressed in Mac OS X v10.4.7. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9:
    The AFP server contains an integer overflow that can be triggered by an authenticated user. A malicious user with access to the AFP server may be able to cause a denial of service attack or arbitrary code execution with system privileges. The AFP server is not enabled by default on Mac OS X. This update addresses the issue by performing additional validation. Credit to Dino Dai Zovi of Matasano Security for reporting this issue. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7.
    On Mac OS X Server, the AFP server supports reconnection of file sharing sessions after a network outage. The storage of reconnect keys is world-readable. It may be possible for an authenticated local user to read the reconnect keys, use them to impersonate another user over AFP, and access files or folders with the privileges of the impersonated user. This update addresses the issue by protecting the reconnect keys with appropriate file system permissions. This issue only affects Mac OS X Server. Available for: Mac OS X Server v10.3.9, Mac OS X Server v10.4.7.
    An unchecked error condition exists in the AFP server that may lead to a crash. By carefully crafting an invalid AFP request, an attacker may be able to trigger this condition and cause a denial of service. This update addresses the issue by handling the formerly unchecked error condition. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7
    Bluetooth
    The security of the Bluetooth Setup Assistant has been improved in this update for Mac OS X v10.4.7. The length of the automatically generated passkey used for pairing has been increased from six characters to eight characters. Available for: Mac OS X v10.4.7, Mac OS X Server v10.4.7
    Bom
    An issue in Bom's compression state handling may cause heap corruption. By carefully crafting a corrupt Zip archive and persuading a victim to open it, an attacker may be able to trigger this condition which could lead to an application crash or arbitrary code execution. Note that Safari will automatically open archives when "Open `safe' files after downloading" is enabled. This update addresses the issue by properly handling such malformed Zip archives. Credit to Tom Ferris of Security-Protocols.com for reporting this issue. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7.
    DHCP
    A stack buffer overflow exists in bootpd's request processing. By carefully crafting a malicious BOOTP request, a remote attacker may be able to trigger the overflow and cause arbitrary code execution with the privileges of the system. Note that bootpd is not enabled by default in Mac OS X, and must be manually configured in order to be enabled. This update addresses the issue by performing additional bounds checking. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7.
    dyld
    Malicious local system users may specify dynamic linker options that cause output to standard error. This output contains informational content and potentially user-specified content. As a result, privileged applications that parse or reuse standard error may be influenced inappropriately. This update addresses the issue by ignoring the problematic dynamic linker options in privileged applications. Credit to Neil Archibald of Suresec LTD for reporting this issue. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7.
    An improperly handled condition in the dynamic linker may lead to including dangerous paths when searching for libraries to load into privileged applications. As a result, malicious local users may cause the dynamic linker to load and execute arbitrary code with elevated privileges. This update addresses the issue by properly selecting search paths when executing privileged applications. Credit to Neil Archibald of Suresec LTD for reporting this issue. Available for: Mac OS X v10.4.7, Mac OS X Server v10.4.7
    fetchmail
    Several issues in the fetchmail utility were discovered. The most serious issue could lead to arbitrary code execution when fetching mail from a malicious POP3 mail server. All issues are described at the fetchmail website (fetchmail.berlios.de). This update addresses the issues by updating fetchmail to version 6.3.4. In addition, fetchmail is no longer distributed as a privileged utility. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7.
    gunzip
    A race condition may allow a malicious local user to modify the permissions of files owned by another user executing gunzip. This issue is only exploitable when executing gunzip on files in directories that are modifiable by other users. This update addresses the issue by properly handling files while decompressing. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7.
    A directory traversal vulnerability is present in the command line utility gunzip when it is used with the non-default "-N" option. By carefully crafting a malicious compressed file and persuading a user to open it with "gunzip -N", an attacker may replace or create arbitrary files with the privileges of the victim. This update addresses the issue by properly stripping paths from files when decompressing. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7
    Image RAW
    By carefully crafting a corrupt Canon RAW image, an attacker can trigger a buffer overflow which may lead to an application crash or arbitrary code execution. This update addresses the issue by performing additional validation of Canon RAW images. This issue does not affect systems prior to Mac OS X v10.4. Available for: Mac OS X v10.4.7, Mac OS X Server v10.4.7.
    ImageIO
    By carefully crafting a corrupt Radiance image, an attacker can trigger an integer overflow which may lead to an application crash or arbitrary code execution. This update addresses the issue by performing additional validation of Radiance images. This issue does not affect systems prior to Mac OS X v10.4. Available for: Mac OS X v10.4.7, Mac OS X Server v10.4.7
    By carefully crafting a corrupt GIF image, an attacker can trigger an undetected memory allocation failure which may lead to an application crash or arbitrary code execution. This update addresses the issue by performing additional validation of GIF images. This issue does not affect systems prior to Mac OS X v10.4. Available for: Mac OS X v10.4.7, Mac OS X Server v10.4.7.
    By carefully crafting a corrupt GIF image, an attacker can trigger an integer overflow which may lead to an application crash or arbitrary code execution. This update addresses the issue by performing additional validation of GIF images. This issue does not affect systems prior to Mac OS X v10.4. Credit to Tom Ferris of Security-Protocols.com for reporting this issue. Available for: Mac OS X v10.4.7, Mac OS X Server v10.4.7
    LaunchServices
    Download Validation may erroneously identify certain files containing HTML as "safe". If such a file is downloaded in Safari and Safari's "Open `safe' files after downloading" option is enabled, the HTML document will automatically be opened from a local URI. This would allow any JavaScript code embedded in the document to bypass access restrictions normally imposed on remote content. This update provides additional checks to identify potentially malicious file types so that they are not automatically opened. This issue does not affect systems prior to Mac OS X v10.4. Available for: Mac OS X v10.4.7, Mac OS X Server v10.4.7
    OpenSSH
    Attempting to log in to an OpenSSH server ("Remote Login") using a nonexistent account causes the authentication process to hang. An attacker can exploit this behavior to detect the existence of a particular account. A large number of such attempts may lead to a denial of service. This update addresses the issue by properly handling attempted logins by nonexistent users. This issue does not affect systems prior to Mac OS X v10.4. Credit to Rob Middleton of the Centenary Institute (Sydney, Australia) for reporting this issue. Available for: Mac OS X v10.4.7, Mac OS X Server v10.4.7
    telnet
    When connected to a TELNET server, the client may send the contents of arbitrary environment variables to the server if the server requests them. Some environment variables may contain sensitive information that should not be sent over the network. This update addresses the issue by ensuring that only non-sensitive variables and variables that the user has explicitly requested are are shared with the server. Credit to Gael Delalleau and iDEFENSE for reporting this issue. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7.
    WebKit
    A maliciously-crafted HTML document could cause a previously deallocated object to be accessed. This may lead to an application crash or arbitrary code execution. This update addresses the issue by properly handling such documents. Credit to Jesse Ruderman of Mozilla Corporation for reporting this issue. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7
    AppKit, ImageIO
    Buffer overflows were discovered in TIFF tag handling (CVE-2006-3459, CVE-2006-3465), the TIFF PixarLog decoder (CVE-2006-3461), and the TIFF NeXT RLE decoder (CVE-2006-3462). By carefully crafting a corrupt TIFF image, an attacker can trigger a buffer overflow which may lead to an application crash or arbitrary code execution. This update addresses the issue by performing additional validation of TIFF images. Systems prior to Mac OS X v10.4 are affected only by the TIFF NeXT RLE decoder issue (CVE-2006-3462). Credit to Tavis Ormandy, Google Security Team for reporting this issue. Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9, Mac OS X v10.4.7, Mac OS X Server v10.4.7./

    Right after installing Security Update 2006-004 (Intel) on my macbook pro I am having troubles with my wireless connectivity. Here is the dump from the console:
    Aug 3 15:49:43 x-ray /System/Library/PrivateFrameworks/Apple80211.framework/Resources/airport: Error: WirelessAssociate2() = 88001006 for network RadioActive
    Aug 3 15:49:43 x-ray /System/Library/PrivateFrameworks/Apple80211.framework/Resources/airport: Error: (had password)
    Aug 3 15:49:51 x-ray /System/Library/PrivateFrameworks/Apple80211.framework/Resources/airport: Error: WirelessAssociate2() = 88001006 for network RadioActive
    Aug 3 15:49:51 x-ray /System/Library/PrivateFrameworks/Apple80211.framework/Resources/airport: Error: (had password)
    Aug 3 15:49:59 x-ray /System/Library/PrivateFrameworks/Apple80211.framework/Resources/airport: Error: WirelessAssociate2() = 88001006 for network RadioActive
    Aug 3 15:49:59 x-ray /System/Library/PrivateFrameworks/Apple80211.framework/Resources/airport: Error: (had password)
    I can reboot and it will work, but if I put my macbook to sleep it, when I wake it, it will do the same thing again.
    I am also getting timeouts waiting for results of 1st wireless scan to complete in console.
    Anyone else having this issue?
    MBP15-2GHZ   Mac OS X (10.4.7)  

  • System preferences shot after Security Update 2006-008 - no sound any more

    All sorts of strange problems after running the 2006-008 security update, yet only affecting one my two MacMini:
    System Preferences completely "shot", with the Date&Time item/icon looking very odd.
    The little flag for language/keyboard setting and date/time did not show any more in the top menu bar -- basically everything left side of the blue Spotlight magnifying glass icon was gone.
    Also Safari much more prone to quit.
    Managed to delete some prefs and cached stuff and to replace the System Preferences application with the one from the other (working ok) Mac.
    (I wish such components were available on the web!)
    However: Currently I get no sound whatsoever. When I check the option to have the little speaker symbol displayed in the menu bar it shows. But as soon as I click it once, it vanishes from the menu bar.
    In the Sound window, I have Volume set to full, yet everything is greyed out, "Sound off" is checked without my doing, while "Display sound volume in the menu bar" unchecks itself everytime(!)
    And, very odd: While resetting PRAM and the fsck-routine working ok (no problems found) and disk utility claiming to have repaired all permissions, I can not run a reset of Open Firmware/nvram with the O-F-Apple-Alt key combination (I'm using an original Apple USB Keyboard for this, since I'm aware that my 3rd party keyboards from Logitech and Microsoft often refuse to perform such kind of "low level" tasks).
    Mac Mini 1.66 GHz 2 GB RAM   Mac OS X (10.4.8)   German language OS

    finally found the solution to my problems at
    http://www.macfixit.com/article.php?story=20061229012312895
    Late-Breakers
    Friday, December 29 2006 @ 01:23 AM PST
    Security Update 2006-008 Special Report: General fixes for common issues
    "Re-apply the Mac OS X 10.4.8 combo updater Once again, re-application of the current combination updater (Mac OS X 10.4.8 for PowerPC or Intel) has proven useful in the case of Security Update 2006-008. Doing so overwrites potentially problem-causing files".
    while it is widely known that the folks from redmond do release software before all the bugs are removed, i was not aware before that apple is following the same approach: using their customers as guinea pigs when it comes to updates. there is plenty of reports on MacFixIt about all sorts of troubles with previous apple os updates.
    Mac Mini 1.66 GHz 2 GB RAM   Mac OS X (10.4.8)   German language OS

  • Startup fails after Security Update 2006-007

    My eMac hangs at the initial gray startup screen. All I did was to allow Software Update to install Security Update 2006-007. I have waited as long as 60+ minutes, hoping some process would time out - but this is not the case.
    My particulars: G4 eMac, 512Mb RAM, 40Gb drive with 15Gb free, 10.3.9 OS X Server (only supports a wireless classroom of 20 ibooks).
    Troubleshooting I have done:
    * Booted off of Mac OS X install disc. From Disk Utility, repaired permissions (minor fixes) and repaired hard drive (no errors at all).
    * Booted into command-V mode. Hangs after only 7 lines. The last line: "BSD root: disk0s3, major 14, minor 2"
    Is there any way to undo a Security Update from the Terminal window? I really don't want to do an 'install & archive', with all my user accounts, etc. I have a firewire backup, but as of last week when I got a CCC error it is no longer bootable. I am a high school teacher who knows a bit, but never enough

    I seems I'm not the only one experiencing start up problems after the 2006-2007 security update. G-4 Power PC, 466MHZ running OSX 10.3.9
    My problems are exasperated by the fact that there was a power outage exactly the same time I did the security update. Now my start up screen goes no further than the whitescreem with the blue bar. IT comes to within 1/4" or 1/16" of the end and stops.
    What I've tried:
    booted from OSx 10.3.9 Install disk,used disk utilities, Disk First Aid, no major problems found.
    Still sticks on start.
    Started from Disk Warrior and ran repair no problems. Still sticks on start.
    Tried to Safe Boot, with no success.
    Zapped the PRAM 4 times. No success.
    Tried to start from OSX install disk then bring up my backup disk drive from start up manager. Able to bring up back up, but same problem on start up as built in disk drive. Now I don't know how to unmount the backup disk drive without damage. THIS IS MY MAIN CONCERN AT THIS POINT. IF I LOSE THE BACKUP I'M FRIED!
    Please help, I don't know when we will have another power outage and my UPS backup power seems to be compromised also.
    Thanks
    G-4 466   Mac OS X (10.3.9)  

  • Apache denying http requests- could it be Security update 2006-007PPC?

    I've been webhosting off an iMac G4 for two years and yesterday no one could access any of the pages, coming from multiple DNSs. I opened up sharing and turned on the log, saw some denials. Some improvement by toggling Personal Web Sharing, but goes back to not letting requests go through. Just so happens, I upgraded the hard drive the day before using carbon copy cloner and also converted the main page to a CSS, although can't imagine that would do it since I used the template from a working page. Could it be one of these changed some Apache settings or Security Upgrade is responsible? I'm on the phone right now, telling someone I'm working on it....

    12190 deny tcp from any to any
    65535 allow ip from any to any</pre>Usually, though,
    if you turn on a service, the corresponding port
    should open in the firewall. If the firewall is off,
    I just get the last line starting with
    65535.
    That's about the same, I just didn't publish the info on the other ports because I didn't think it was pertinent.
    Checking
    the access log, I had been getting hammered for a
    while by something automated on PHP calendar I had
    posted- so I shut that down.
    I'm not sure I understand this. Does this mean you
    shut off the firewall and got the hits, or you saw
    the hits being denied? The other log entries you
    posted came from the system log or console, and
    not the Apache access log.
    I can see where that was confusing. Upon reviewing the httpd/access log (as well as any other I thought might provide a clue), there were a slew of hits, all different times of the day from one IP address, all on the PHPicalendar page I had posted. Sometimes the requests would be an individual hit, but most times they would come in groups of ten or twenty all about 4 seconds apart. These were logged all the way back to the oldest entries still in the log files. The computer had been dutifully fulfilling the requests and this most likely explains some system slowness I had been seeing on the machine. Since then I disabled that page and the requests get a 404 reply from Apache. I threw that comment out to justify why I was interested in changing my IP address. By the way, google calendar and iCal integrate really nicely, allowing iCal to subscribe to the google calendar and then I could export the iCal to the PHPicalendar. A little circuitous, but not annoyingly so. Anyway, now that I know that it's being targeted I'll probably just work with google calendar and the google notifier app for macs.
    Again, the closest event to
    the known start of the problem was the Security
    Update 2006-007PPC.
    For what it's worth, I've applied the Security Update
    on this iMac without this problem. Which is not to
    say it's not possible it caused the problem. But if
    so, it's still more likely to be something isolated
    to your system and not a general bug in the update.
    I think I might have figured out the problem. Going through the system log, I noticed the computer sleeping and waking. I went to system prefs and checked the settings, then changed to "never sleep." Seems to be working. I know I didn't change that setting, and I was under the impression that before, the http requests were waking the computer up- although I don't know, I just never had this problem before. To add to the confusion at one point the subnet address of the machine changed because I was trying to debug by doing a network restart and the router was pointing to the wrong computer. I'll have to check with the other users of this machine to see if they altered the setting- but they may not fess up since they know they're not supposed to mess with system prefs- as it is, I've got the parental controls turned on.
    As for the stability of the Comcast IP address, I
    unplugged the modem for about 6 hours last night,
    plugged it back and had the same IP
    address.
    That's been my experience, too. Comcast's IP
    addresses are tied to the MAC address of whatever
    customer supplied equipment faces it. I think you
    might have to be disconnected from the cable modem
    until the DHCP lease expires, and someone else gets
    your old IP address, in order to get a new IP
    address.
    I've been able to force a new IP address by changing
    the MAC address on my router. However, if you decide
    to try this, only use the MAC address from a
    device you have in your physical possession. For
    example, you could clone the MAC address from one of
    your computers to the router. Just make sure you go
    back to the router's real MAC address if you get rid
    of the computer.
    Remember, you have to reboot the cable modem any time
    you change the MAC address of the device connected to
    it. Just like you would if you connected a different
    computer directly to the cable modem.
    charlie
    Thanks, I'll try that. I'm going to give it another day or two to see if it's stable again.
    dan
    iMac G4, MacBook   Mac OS X (10.4.8)  

  • Did Security Update 2006-001 kill SpamAssassin 3.1.0?

    Greetings,
    It appears Apple's Mac OS X 10.3 (Panther) Security Update 2006-001 has killed my SA 3.1.0. After the update, upon starting spamd this is what happens:
    Mar 3 14:05:00 localhost spamd[15757]: spamd: server started on UNIX
    domain socket /tmp/spamd.sock (running version
    3.1.0-agsvsoft_2005102101)
    Mar 3 14:05:01 localhost spamd[15757]: spamd: server pid: 15757
    Mar 3 14:05:01 localhost spamd[15759]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:01 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15759
    Mar 3 14:05:01 localhost spamd[15760]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:01 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15760
    Mar 3 14:05:01 localhost spamd[15757]: prefork: child states: SS
    Mar 3 14:05:01 localhost spamd[15762]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:01 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15762
    Mar 3 14:05:01 localhost spamd[15757]: prefork: child states: SSS
    Mar 3 14:05:01 localhost spamd[15763]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:01 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15763
    Mar 3 14:05:01 localhost spamd[15757]: spamd: handled cleanup of
    child pid 15759 due to SIGCHLD
    Mar 3 14:05:01 localhost spamd[15757]: prefork: child states: SSS
    Mar 3 14:05:01 localhost spamd[15764]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:01 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15764
    Mar 3 14:05:01 localhost spamd[15757]: prefork: child states: SSSS
    Mar 3 14:05:01 localhost spamd[15765]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:02 localhost spamd[15757]: spamd: server successfully
    spawned child process, pid 15765
    Mar 3 14:05:02 localhost spamd[15757]: prefork: child states: SSSSS
    Mar 3 14:05:02 localhost spamd[15757]: prefork: server reached
    --max-clients setting, consider raising it
    Mar 3 14:05:02 localhost spamd[15757]: spamd: handled cleanup of
    child pid 15762 due to SIGCHLD
    Mar 3 14:05:02 localhost spamd[15757]: prefork: select returned error
    on server filehandle:
    Mar 3 14:05:02 localhost spamd[15757]: spamd: handled cleanup of
    child pid 15760 due to SIGCHLD
    Mar 3 14:05:02 localhost spamd[15757]: prefork: select returned error
    on server filehandle:
    Mar 3 14:05:02 localhost spamd[15757]: spamd: handled cleanup of
    child pid 15763 due to SIGCHLD
    Mar 3 14:05:02 localhost spamd[15757]: prefork: select returned error
    on server filehandle:
    Mar 3 14:05:02 localhost spamd[15757]: spamd: handled cleanup of
    child pid 15764 due to SIGCHLD
    Mar 3 14:05:02 localhost spamd[15757]: prefork: select returned error
    on server filehandle:
    Mar 3 14:05:02 localhost spamd[15766]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:02 localhost spamd[15757]: spamd: server successfully
    spawned child process, pid 15766
    Mar 3 14:05:02 localhost spamd[15757]: prefork: child states: SS
    Mar 3 14:05:02 localhost spamd[15767]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:02 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15767
    Mar 3 14:05:02 localhost spamd[15757]: prefork: child states: SSS
    Mar 3 14:05:02 localhost spamd[15768]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:02 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15768
    Mar 3 14:05:02 localhost spamd[15757]: prefork: child states: SSSS
    Mar 3 14:05:02 localhost spamd[15769]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:02 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15769
    Mar 3 14:05:03 localhost spamd[15757]: prefork: child states: SSSSS
    Mar 3 14:05:03 localhost spamd[15757]: prefork: server reached
    --max-clients setting, consider raising it
    Mar 3 14:05:03 localhost spamd[15757]: spamd: handled cleanup of
    child pid 15765 due to SIGCHLD
    Mar 3 14:05:03 localhost spamd[15757]: prefork: select returned error
    on server filehandle:
    Mar 3 14:05:03 localhost spamd[15757]: spamd: handled cleanup of
    child pid 15767 due to SIGCHLD
    Mar 3 14:05:03 localhost spamd[15757]: prefork: select returned error
    on server filehandle:
    Mar 3 14:05:03 localhost spamd[15757]: spamd: handled cleanup of
    child pid 15766 due to SIGCHLD
    Mar 3 14:05:03 localhost spamd[15757]: prefork: select returned error
    on server filehandle:
    Mar 3 14:05:03 localhost spamd[15757]: spamd: handled cleanup of
    child pid 15768 due to SIGCHLD
    Mar 3 14:05:03 localhost spamd[15757]: prefork: select returned error
    on server filehandle:
    Mar 3 14:05:03 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15770
    Mar 3 14:05:03 localhost spamd[15770]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:03 localhost spamd[15757]: prefork: child states: SS
    Mar 3 14:05:03 localhost spamd[15771]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:03 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15771
    Mar 3 14:05:03 localhost spamd[15757]: prefork: child states: SSS
    Mar 3 14:05:03 localhost spamd[15772]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:03 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15772
    Mar 3 14:05:03 localhost spamd[15757]: prefork: child states: SSSS
    Mar 3 14:05:04 localhost spamd[15773]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:04 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15773
    Mar 3 14:05:04 localhost spamd[15757]: prefork: child states: SSSSS
    Mar 3 14:05:04 localhost spamd[15757]: prefork: server reached
    --max-clients setting, consider raising it
    Mar 3 14:05:04 localhost spamd[15757]: spamd: handled cleanup of
    child pid 15769 due to SIGCHLD
    Mar 3 14:05:04 localhost spamd[15757]: prefork: select returned error
    on server filehandle:
    Mar 3 14:05:04 localhost spamd[15757]: spamd: handled cleanup of
    child pid 15772 due to SIGCHLD
    Mar 3 14:05:04 localhost spamd[15757]: prefork: select returned error
    on server filehandle:
    Mar 3 14:05:04 localhost spamd[15757]: spamd: handled cleanup of
    child pid 15770 due to SIGCHLD
    Mar 3 14:05:04 localhost spamd[15757]: prefork: select returned error
    on server filehandle:
    Mar 3 14:05:04 localhost spamd[15757]: spamd: handled cleanup of
    child pid 15771 due to SIGCHLD
    Mar 3 14:05:04 localhost spamd[15757]: prefork: select returned error
    on server filehandle:
    Mar 3 14:05:04 localhost spamd[15774]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:04 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15774
    Mar 3 14:05:04 localhost spamd[15757]: prefork: child states: SS
    Mar 3 14:05:04 localhost spamd[15775]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:04 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15775
    Mar 3 14:05:04 localhost spamd[15757]: prefork: child states: SSS
    Mar 3 14:05:04 localhost spamd[15776]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:05 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15776
    Mar 3 14:05:05 localhost spamd[15757]: spamd: handled cleanup of
    child pid 15773 due to SIGCHLD
    Mar 3 14:05:05 localhost spamd[15757]: Use of uninitialized value in
    numeric eq (==) at
    /Library/Perl/5.8.1/Mail/SpamAssassin/SpamdForkScaling.pm line 598.
    Mar 3 14:05:05 localhost spamd[15757]: Use of uninitialized value in
    numeric eq (==) at
    /Library/Perl/5.8.1/Mail/SpamAssassin/SpamdForkScaling.pm line 598.
    Mar 3 14:05:05 localhost spamd[15757]: Use of uninitialized value in
    numeric eq (==) at
    /Library/Perl/5.8.1/Mail/SpamAssassin/SpamdForkScaling.pm line 598.
    Mar 3 14:05:05 localhost spamd[15757]: Use of uninitialized value in
    numeric eq (==) at
    /Library/Perl/5.8.1/Mail/SpamAssassin/SpamdForkScaling.pm line 598.
    Mar 3 14:05:05 localhost spamd[15757]: Use of uninitialized value in
    numeric eq (==) at
    /Library/Perl/5.8.1/Mail/SpamAssassin/SpamdForkScaling.pm line 598.
    Mar 3 14:05:05 localhost spamd[15757]: prefork: child states: SSSS
    Mar 3 14:05:05 localhost spamd[15777]: setruid() not implemented at
    /usr/bin/spamd line 875.
    Mar 3 14:05:05 localhost spamd[15757]: spamd: server successfully spawned child
    process, pid 15777
    Mar 3 14:05:05 localhost spamd[15757]: prefork: child states: SSSS
    [snip]
    Has anyone else seen this? I note from the release notes:
    perl
    CVE-ID: CVE-2005-4217
    Available for: Mac OS X v10.3.9, Mac OS X Server v10.3.9
    Impact: Perl programs may fail to drop privileges
    Description: When a perl program running as root attempts to switch to another user ID, the operation may fail without notification to the program. This may cause a program to continue to run with root privileges, assuming they have been dropped. This can cause security issues in third-party tools. This update addresses the issue by preventing such applications from continuing if the operation fails. This issue does not affect Mac OS X v10.4 or later systems. Credit to Jason Self for reporting this issue.
    Any advice would be most appreciated.
    Cheers,
    Damon
    PowerMac G4-867   Mac OS X (10.3.9)  

    The update prevents spamd to run as the default user "nobody". Running it as root seems to be the only workaround.

  • Downloading Security Update 2006-001 STOPS (!) my internetconnexion

    NO idea what this is: everytime I want to install new iTunes or Security Update 2006-001 , my internetconnexion falls out. Only then! After resetting router and modem all works fine again, but then when I want to install new iTunes or Security Update it happens again...?????
    I work on iMac G5 -10.4.5
    Anyone has an idea WHAT TO DO?? xxxTHANKS!xxx

    Welcome to Apple Discussions!
    Yes the same happened to me until my regular suggestion of repairing permissions solved it. Applications -> Utilities -> Disk Utility is where you select the hard disk and from First Aid repair permissions. For more upgrading tips, see this article which I wrote:
    http://www.macmaps.com/upgradefaq.html
    Disclaimer: Reference to links I make to my Macmaps.com website are a for your information only type reference. I do not get any profit from this page, and it is open to the public.

  • Security Update 2006-001 - The return?

    Hello!
    According to my software update which popped up after waking the computer I should install the latest security update (PowerPC), even though I installed it just a couple of days ago. Or, that's what I think...
    Should I just go ahead and install this 'second edition' too, or is there a way to check if the first update was installed properly (and to check that it actually happened)?
    Thank you!
    PowerBook G4 Aluminum   Mac OS X (10.4.5)  

    I installed security update 2006-001 last week and my SU shows nothing futher. And further, there is nothing further. Either your SU prefs are corrupted or it did not install properly.
    Look in /library/receipts to verify that you have that receipt.
    -mj
    [email protected]

  • Security Update 2006-001 Killed network preferences

    After upgrading with the 2006-001 Security Update, none of my network preferences will set up correctly anymore. DHCP doesn't seem to be doing anything, and when I tell it to use a manual address via the system preferences, it appears that it's not actually doing anything. Mac OS System Preferences will not even detect that I have an ethernet cable plugged in, though if I use ifconfig and route I can get a LITTLE bit of traffic to go out, so I know it's connected and working.
    Any one have any ideas on this? Absolutely frustrating because I can no longer work until this is fixed (sitting in an internet cafe trying to figure out what the problem is). I'm running 10.3.9 on a 1.2Ghz 12" Powerbook. I don't remember my Unix days well enough to try to manually set up routes and our DNS settings, nor do I know if the appropriate tools are in Mac OS, but the Apple network preferences are clearly busted.
    Is there anyway to uninstall an update?
    Patrick
    12" 1.2 Ghz PB   Mac OS X (10.3.9)  

    I had the same Network & Airport issue after installing Security Update 2006-001 on my wife's iBook G3 running 10.3.9 Trying to access our Airport base station wirelessly would inevitably hang as I selected the Airport network.
    I noticed that every time I shut down the computer there was a brief showing of the keychain window asking to allow keychain access...this right as the computer went down (no chance to hit the allow button).
    Spent the better part of an entire afternoon trying to fix this problem. Then read all the posts here (amazing how many people have problems with this update). Tried to reset permissions - didn't work. In the end, I rebooted the Airport...went into the Airport Admin Utility with my PowerBook to fiddle around...removed our Airport network from the keychain in my wife's iBook...explored other aspects via the keychain access utility.
    None of that seemed to work. I also figure I reset the permissions about half a dozen times (with subsequent reboot). None of that was working either...until after one permissions reset & reboot things came good. I got the keychain window, allowed access, and hey presto...online. So far it's been OK for over 12 hours (including after reboot).
    What exactly worked? I don't know. "It's a mystery".
    One thing's for sure...this update is not going on any of my other machines!
    Come on Apple...surely you can do better than send us automatic updates that break our computers and sap our time!
    iBook   Mac OS X (10.3.9)  

  • Focus switch to finder after Security Update 2006-001

    Just updated with Security Update 2006-001 on PB G4 running 10.4.5.
    While running Safari or Mail or any App. and not using the app (like when reading a webpage or mail message) the focus of the OS switches to the Finder after about 10 seconds or so. So in the top menubar right from Apple icon the OS switches from Safari or Mail to Finder.
    Moving the mouse does not make any difference. i.e does not prevent or delay the switch.
    Clicking on the application window returns focus to that application (Safari or Mail).
    Anyone?

    thanks for the input. did not resolve the probelm though. finder started to crash every 2 minutes.
    but on the bright side: its a user thing. my guest account was not affected.
    so i trashed most of my prefs. that resolved the finder problem.
    currently working on restoring my prefs & email accounts, oh well

  • After applying Security Update 2006-001 can't launch Office X apps

    I noticed that, after applying Security Update 2006-001, I can't launch Microsoft Word nor Excel nor Power Point (Office X, 10.1.6 updated). If I double click the app icon, select and try to open from File menu or try to launch it from the Dock, I get the message "The app has unexpectedly quit". This does not affect Entourage so far. I can open existing files double clicking on their icons and, once the app is running, create new files from menu bar. Repaired permissions, checked for corrupted preferences files or templates but to no avail.
    Can anybody help?
    iBook G4   Mac OS X (10.3.9)   512 MB RAM

    DivX Doctor is a freeware I had downloaded a few days before applying Security Update 2006-01 (http://www.macupdate.com/info.php/id/4683). It certainly was responsible for my problems with Office X apps because, as I said, they completely disappeared as soon as I got rid of it.
    I hadn't the memory problems you mentioned (I've applied also Security update 2006-02 without problems).
    Don't know if this can help, but you might want to give a try to Disk inventory X (http://www.macupdate.com/info.php/id/14393) [quote]Disk Inventory X is a disk usage utility for Mac OS X. It shows the sizes of files and folders in a special graphical way called "treemaps".
    If you've ever wondered were all your disk space has gone, Disk Inventory X will help you to answer this question.[/quote]
    Once DiskWarrior fixed a problem with free hard disk space on my machine, even though a small one.
    iBook G4    

  • Question Regarding Security Updates 2006-005 and 2006-006?

    Okay I just noticed Apple Security Update 2006-005 and 2006-006 are available for download. Has anyone had any problems with these updates? I remember the Security Update 2006-001 was a nightmare for me -- Safari was broken after that update I had to do a complete OS reinstall then re-update to Mac OSZ 10.3.9 Panther and I only want to update if the likelihood of any problems occuring is very slim. Anyone running Mac OS X on PowerPC chips (i.e. using a PowerBook, an older iMac, Mac Mini, PowerMac etc) or on Intel chips (i.e. MacBook Pro, the new iMacs, new Mac Mini's etc) with Mac OS X Panther, Mac OS X Tiger etc having any problems with either update?

    (10.3.9 Client) seems to have broken my CS2 Version Cue after loading Security Update 2006-006 via Software Update - 27MB or something.
    Though afterwards all apps (Illustrator 12.0.1, Acrobat 7.0.8, PS 9.0.1 and InDesign 4.0.4) open and run fine, Version Cue disappeared from the Desktop Menu and System Preferences and says it's no longer installed, all this immediately after loading the Update and restarting.
    Two restarts and a Repair Permissions haven't resolved the issue. I've downloaded the stand alone Update and have run that but without any luck. I'd had no history of any trouble with any Security Update prior to this, and have run good maintenance schedules.
    I've not seen any other posts or related issues to mine, so maybe it's just my isolated event?

  • After Security update 2006-002, RAM is halved

    Hi,
    Right after applying the Security Update 2006-002, I experienced a freeze upon wake-up from sleep. And a general application slowdown.
    A fleeting look past the About this Mac window surprisingly revealed that the system now identifies the two additional (trusty for 8 months or so) OWC 1GB RAM modules as 512kb only. Startup memory test is reported as failed - But the modules are still listed as OK.)
    I tried putting the modules in another bank. This works, after restart memory is identified correctly and system breezes. Unfortunately, another restart brings things back to the original, 1.5GB state.
    Resetting nvram (reset-nvram, set-defaults, reset-all) in OF also mostly has the same effect: First restart restores things back to normal, second restart brings the problem back.
    Having read about the recent PB problems where a system update aparently disabled one memory slot, something tells me it's not the RAM modules themselves. (Yes, they check out fine in memory tests.)
    Any ideas?
    Best,
    Ben

    Problem disappeared after I caved in and bought new RAM (Kingston Value Ram) as recomended by / from a local dealer. I am inclined to think this in fact was a defect in the RAM modules themselves, OWC has issued a RMA on them and I'm sending them back. Thanks!

  • Any Problems With Security Update 2006-002

    Hi a few weeks ago I updated my PowerBook G4 running Mac OS 10.3.9 to Apple Security Update 2006-001 and instantly my Dock Meny dissappeared after installation and Safari broke. My Dock Menu returned after installation but Safari remained broken.
    In the end I simply reinstalled Mac OS X Panther from scratch, recreated my user account and copied my data (I had it saved) back to my Mac.
    I don't want to run the risk of something like this happening again. I do not have Apple Security Update 2006-001 installed at this time but I do have Apple Security Updates from 2005 installed and 10.3.9 on my system.
    If I install Apple Security Update 2006-002 on my Mac (will be updating from 2005 security updates) - not updating 2006-001 to 2006-002 but installing first 2006 Security Update for the first time could I run into any problems?
    Want to hear from other users who have installed this update - have updated from 2006-001 and preferrably anyone who is installing this update directly (not over 2006-001) before updating myself.

    Ive got some serious problems with 2006-001 (and they wernt cured by installing 2006-002).
    Photoshop and flash mx stopped working and I am unable to reinstall either!
    Ive deleted all prefs, caches, everything associated with these apps.
    Ive tried installing different versions of both apps - but to no avail.
    Ive repaired disk permissions (even in single user mode) - and while that did straighten out a few incorrect permissions and uid's it did'nt fix my problems.
    Totally at the end of my tether now, and getting impatient with Apple - this is my livelyhood and I cant afford to have downtime!
    The "broken webkit" fiasco at the back end of last year was bad enough, but this just takes the p*!
    Not happy - but hopeful that someone has a fix (preferably one that doesn't involve archive and restore)....

  • Problems with Security Update 2006-002

    Hi there,
    I have problems with latest security update. I do not know what went wrong, but after installing "Security Update 2006-002 (PowerPC)" (1.0) on 2006-03-14 15:52:40 +0100: with Software Update from Tiger, my desktop (and probably not only desktop) is damaged.
    The most visible thing is that all .html and .htm documents on my desktop does not have Safari icon anymore, they have some 'blank' icon and doubleclick on them DOES NOT start-up Safari, why?
    See here on the screenshot: http://www.jirkacech.com/files/Tiger-problemy-screeshot.png
    note blank "apple - start.webarchive" also the Safari itself have somehow damaged icon, to same blank thing with triangle, possibly some 'generic app' or 'default.app' icon. It sits in the dock on 5th from left...(dont worry about real safari icon, that's newly added by me)
    Also, on, second screenshot, http://www.jirkacech.com/files/Tiger-problemy-2.png you see that safari itself have some strange icon.
    I am getting crazy, since I do not know what else is broken by last update.
    I have tryed to repair permissions at least 3x, and also run update_prebindings and reboot, delete all system and user caches, and reboot.
    Whole issue is system-wide, not only for one user.
    iBook G4   Mac OS X (10.4.5)   1.33 GHz, 512 MB, 12-inch

    The first thing you can try, if this is limited only to Safari icons, is to select on such icon, then press COMMAND-I to open the Get Info window. In the Open With section select Safari from the dropdown menu as the default app. Then click on the Change All button.
    If this doesn't resolve the problem or if the problem extends to other appicons as well, then you may have some disk corruption resulting from not repairing the hard drive and permissions before doing the update. I suggest you do that:
    Boot from your Tiger DVD. After the installer loads select Disk Utility from the Utilities menu. After DU loads select your OS X volume from the list on the left, click on the First Aid tab, then click on the Repair Disk button. If DU reports any errors that have been fixed, then re-run Repair Disk until no errors are reported. If no errors are reported click on the Repair Permissions button. Wait until the operation completes, then quit DU and return to the installer. Now shutdown the computer for a couple of minutes and then restart normally.
    If DU reports errors it cannot fix, then you will need Disk Warrior (3.0.3 for Tiger) and/or TechTool Pro (4.1.1 for Tiger) to repair the drive. If you don't have either of them or if neither of them can fix the drive, then you will need to reformat the drive and reinstall OS X.

  • MacBookPro Freezes after Installing Latest Security Update 2006-003

    After downloading and installing the latest security update 2006-003, MacBook Pro freezes when trying to do anything. Seems to do ok in safe mode but did freeze when trying to verify disk with Disk Utility. (did not try to repair as I am out of town at a motel without Tiger disks). Any suggestions before calling apple?
    MacBook Pro 15   Mac OS X (10.4.6)  

    Since my post, I think I have solved the problem. At least MyMacBook is working ok so far. What I did is started up in safe mode (for the third time) then I went through the "Library" and looked for stuff that looked like it wouldn't work on a MacBook. This included some Norton Utility things. Also went through preferences and Application Support and did the same thing. By the way I had transferred all this stuff from my old Mac using the transfer app and connecting the two with firewire.
    Anyway, it's been working for about an hour. I'll keep this post open for a couple of days to see if it keeps working.
    Bill

Maybe you are looking for

  • How do I stop Firefox unloading background tabs?

    Hi there, Can anyone tell me how to stop firefox for android unloading tabs it thinks are in the background and not being used? Here's the situation - I had about 5 tabs open in firefox on my Galaxy Note (around 1GB memory) and no other applications

  • How can I get an evaluation copy of WLE?

    Hi there: I have this question for a long time, that is how can I get an evaluation copy of WLE? Any suggestions or ideas appreciated. [email protected]

  • Not all tracks play in playlists on iPad

    I have various playlists set up on my Windows 8.1 laptop. some of which I sync with my iPad. I have noticed that although all the track names etc. appear in the Music app on the iPad, when I play the playlist, all the tracks do not play.  I have two

  • XSS for SAP NW CE 7.2

    Does anyone know if there is a NW CE 7.2 compatible version of the portal applications ESS 600 and MSS 600 available and if there is a published list of SAP Standard functionality already available for NW CE 7.2. Thanks and regards Willem

  • I have a problem with my application update since i updated to iOS6

    i am having a problem with my application update since i updated my iphonw to iOS 6. small updates are taking very long time and even not getting finished after several hours. my internet connection is very fine and having good speed. i think updatin