Apple releases iOS 16.3.1 and other updates with fix for “actively exploited” bug

0
160


Apple

Apple is releasing minor updates to all of its main software program platforms at this time to deal with one high-priority safety vulnerability and to repair a handful of different device- and service-specific points. The iOS 16.3.1, iPadOS 16.3.1, and macOS 13.2.1 updates all patch an “actively exploited” arbitrary code execution vulnerability in WebKit/Safari, and a second kernel vulnerability that is not recognized to be actively exploited.

These updates additionally repair a difficulty that might trigger iCloud to change into unresponsive and a Siri bug that was holding it from working correctly with the Discover My function. A HomePod 16.3.2 OS replace additionally fixes some Siri issues that might trigger good house requests to fail. Detailed launch notes aren’t obtainable for watchOS 9.3.1 or tvOS 16.3.2, however these updates are additionally obtainable to obtain and presumably repair related issues.

For iPhone 14 fashions, the iOS 16.3.1 replace makes additional tweaks to the Crash Detection security function. Meant to mechanically contact first responders within the occasion of a automotive crash or sudden fall, Crash Detection has additionally made headlines for the false positives that it will possibly generate—riding rollercoasters, skiing, dropping the telephone at excessive velocities, and different actions have all set off Crash Detection.

For customers of older Apple gadgets, there may be a Safari update available for macOS Big Sur and Monterey to repair the WebKit bug, however no equal iOS 15 or iPadOS 15 replace for older iPhones and iPads, and no documented repair for the kernel problem in any of those older working techniques. We have requested Apple whether or not these OS variations are weak to those bugs and, if that’s the case, whether or not the corporate plans to launch an replace for them. We’ll replace the article if we obtain a response.



Source link

LEAVE A REPLY

Please enter your comment!
Please enter your name here