[<prev] [next>] [day] [month] [year] [list]
Message-id: <AEE1209A-F84B-411C-85BB-BF0AD94E56BD@lists.apple.com>
Date: Mon, 10 Jul 2023 15:50:24 -0700
From: Apple Product Security via Fulldisclosure <fulldisclosure@...lists.org>
To: security-announce@...ts.apple.com
Subject: [FD] APPLE-SA-2023-07-10-2 Rapid Security Responses for iOS 16.5.1
and iPadOS 16.5.1
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
APPLE-SA-2023-07-10-2 Rapid Security Responses for iOS 16.5.1 and iPadOS 16.5.1
Rapid Security Responses for iOS 16.5.1 and iPadOS 16.5.1 addresses the following issues.
Information about the security content is also available at
https://support.apple.com/kb/HT213823.
Apple maintains a Security Updates page at
https://support.apple.com/HT201222 which lists recent
software updates with security advisories.
This document describes the content of Rapid Security Responses.
About Rapid Security Responses
Rapid Security Responses deliver important security improvements between
software updates and are available only for the latest versions of iOS,
iPadOS, and macOS. Learn more about Rapid Security Responses.
Recent releases are listed on the Apple security releases page.
iOS 16.5.1 (a) and iPadOS 16.5.1 (a)
WebKit
Available for: iOS 16.5.1 and iPadOS 16.5.1
Impact: Processing web content may lead to arbitrary code execution.
Apple is aware of a report that this issue may have been actively
exploited.
Description: The issue was addressed with improved checks.
CVE-2023-37450: an anonymous researcher
All information is also posted on the Apple Security Updates
web site: https://support.apple.com/en-us/HT201222.
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----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=Sn9x
-----END PGP SIGNATURE-----
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: https://seclists.org/fulldisclosure/
Powered by blists - more mailing lists