Feeds

Panther bitten by second data damaging bug

FileVault to blame this time

  • alert
  • submit to reddit

Mac OS X 10.3's FileVault system, which protects each user's home folder with on-the-fly 128-but AES data encryption, has been found to contain a data-damaging glitch, Apple has admitted.

The bug manifests itself as a request to regain lost disk space in the encrypted directory. If the user responds in the affirmative, FileVault's reclamation process damages the user's keychain data. Keychain is the Mac OS' secure password storage system, allowing passwords to be accessed through a single master code.

Damaging the data held in the keychain prevents the Safari web browser from automatically signing on to certain web sites, stops Mail logging on to email servers and so on. Many other applications that store passwords in the keychain are likely to be affected too.

Apple last night said it was aware of the problem but was not yet recommending that users disable FileVault. Simply refusing to allow the software to reclaim lost disk space keeps the bug at bay.

The FileVault problem follows an earlier clash between Panther and version 1.0.3 of Oxford Semiconductor's 800MBps FireWire interface chip. That bug lead to data being damaged on external hard drives connected to the host Mac after Panther had been installed on the host system. Oxford sent out updated firmware in September, but drive vendors have only now started to offer it to their customers. ®

Related Story

Apple blames Oxford for Firewire data loss bug

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.