Apple patches every little thing, lastly reveals thriller of iOS 16.1.2 – Naked Security

0
143
Apple patches every little thing, lastly reveals thriller of iOS 16.1.2 – Naked Security


Apple has simply revealed a wide selection of safety fixes for all its supported platforms, from the smallest watch to the most important laptop computer.

In different phrases, in the event you’ve bought an Apple product, and it’s nonetheless formally supported, we urge you to do an replace verify now.

Remember that even in the event you’ve set your iDevices to replace solely routinely, doing a guide verify remains to be effectively value it, as a result of:

  • It ensures that you simply catch up if one thing went improper together with your final computerized replace.
  • It jumps you to the pinnacle of the queue in order that even in the event you haven’t but been alerted to the replace by Apple, you’ll have the ability to get it without delay anyway.

What you want

To summarise, the variations you wish to see after you’ve upgraded are as follows:

  • macOS Ventura 13.1
  • macOS Monterey 12.6.2
  • macOS Big Sur 11.7.2
  • tvOS 16.2
  • watchOS 9.2
  • iOS 16.2 (current gadgets solely)
  • iPadOS 16.2 (current gadgets solely)
  • iOS 15.7.2 (earlier gadgets, again to iPhone 6s)
  • iPadOS 15.7.2 (earlier gadgets, together with iPod contact seventh gen)

If you’ve bought Big Sur or Monterey, you’ll additionally want a separate replace to take you to Safari 16.2 to repair a lot of browser and web-rendering bugs. (Other platform updates get their Safari fixes bundled in.)

Mystery defined

Amusingly, if that’s the appropriate phrase, a number of the the thriller surrounding Apple’s current iOS 16.1.2 replace, which got here out all by itself, with no supporting documentation in any respect, has belatedly been revealed:

A bug in WebKit, Apple’s net rendering engine, generally known as CVE-2022-42856, apparently confirmed up in an exploit getting used within the wild, and though that bug has now been patched in all of the abovementioned updates (besides watchOS)…

…it appears that evidently the identified exploit solely labored on iOS.

Of course, on condition that the replace advisories now explicitly state that the exploit really solely labored “against versions of iOS released before iOS 15.1”, we nonetheless don’t know why iOS 16 customers bought an replace whereas iOS 15 customers didn’t.

Perhaps Apple hoped that some customers who had been nonetheless again on iOS 15, and thus doubtlessly susceptible, would bounce to iOS 16 and get themselves as up-to-date as doable?

Or maybe the iOS 16.1.2 replace was merely a precaution that took much less time to push out than it did for Apple to make sure that iOS 16 was not, in truth, in danger?

What to do?

  • On your iPhone or iPad: Settings > General > Software Update
  • On your Mac: Apple menu > About this Mac > Software Update…

LEAVE A REPLY

Please enter your comment!
Please enter your name here