![]() Apple is aware of a report that this issue may have been actively exploited.Ī validation issue was addressed with improved logic. Processing a maliciously crafted image may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited against versions of iOS released before iOS 15.7.1.Ī buffer overflow issue was addressed with improved memory handling. Processing a font file may lead to arbitrary code execution. This issue is fixed in macOS Ventura 13.2, iOS 15.7.8 and iPadOS 15.7.8, watchOS 9.3, tvOS 16.3, iOS 16.3 and iPadOS 16.3, macOS Big Sur 11.7.9, macOS Monterey 12.6.8. ![]() The issue was addressed with improved handling of caches. Inappropriate implementation in App Launcher in Google Chrome on iOS prior to 1.96 allowed a remote attacker to potentially spoof elements of the security UI via a crafted HTML page.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |