Feeds

Apple yanks Snow Leopard Server 10.6.5 update

Trouble trove prompts disappearing act

Remote control for virtualized desktops

Updated Apple has pulled a Soviet-style disappearing act on its recently released Mac OS X 10.6.5 Snow Leopard Server upgrade — the upgrade has become an un-upgrade, pulled from Jobs & Co.'s download service.

Since the upgrade was released just last Wednesday, Apple's discussion boards have been crying out about the update causing problems with LDAP, DNS, email, external drives, and other headaches. (Thanks for the heads-up, AppleInsider.)

One poster, MackS, subtly voiced his displeasure thusly: "What a garbage release. Those packages should've NOT be released! DO NOT UPGRADE!!!!!!!!!!!!"

Of course, every time that an OS update appears — server or client — discussion boards light up with problems. And many problems, such as some of Snow Leopard Servers LDAP challenges, find fixes.

But pulling an upgrade less than a week after its appearance is an unusual occurrence — although, of course, doing so without explanation is in keeping with Cupertino's secretive personality.

The Snow Leopard Server turnaround comes in the wake of Apple's announcement last week, buried on its Xserve Resources page, that it would discontinue its 1U rackmountable server on January 31, 2011. It appears that Apple is, indeed, as Steve Jobs described it during his company's financial results conference call: "a very high-volume consumer-electronics manufacturer."

The Mac OS X 10.6.5 client version is still available for download, however — despite the fact that it bricked Macs that use PGP's Whole Disk Encryption, plus a flurry of other problems. ®

Update

Late Monday afternoon, Pacific Standard Time, Apple again made the Snow Leopard Server version 10.6.5 available for download. In a security notice published concurrently with the reposting, Apple noted in part that:

A memory aliasing issue in Dovecot's handling of user names exists in Mac OS X Server v10.6.5 (10H574). On systems configured with Dovecot as a mail server, a user may receive mail that was intended for other users. This issue is addressed through improved memory management. Dovecot is only provided with Mac OS X Server systems. This issue only affects systems running Mac OS X Server v10.6.5 (10H574).

No mention was made of any other the other problems that users have reported after installing the 10.6.5 update.

Internet Security Threat Report 2014

More from The Register

next story
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Microsoft: Your Linux Docker containers are now OURS to command
New tool lets admins wrangle Linux apps from Windows
Microsoft adds video offering to Office 365. Oh NOES, you'll need Adobe Flash
Lovely presentations... but not on your Flash-hating mobe
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
HTML5 vs native: Harry Coder and the mudblood mobile app princes
Developers just want their ideas to generate money
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
The total economic impact of Druva inSync
Examining the ROI enterprises may realize by implementing inSync, as they look to improve backup and recovery of endpoint data in a cost-effective manner.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.