• Today Apple released iOS 16.4 with over 30 security fixes found by inde

    From NewsKrawler@21:1/5 to All on Tue Mar 28 05:33:50 2023
    https://www.zdnet.com/article/its-time-to-update-all-of-your-apple-devices-again-heres-why/
    It's time to update all of your Apple devices again based on new bugs found by many independent security researchers.

    Apple just released iOS 16.4 with over 30 security fixes iPhone, alongside updates for Mac, iPad and more.

    Today Apple released iOS 16.4, iPadOS 16.4, MacOS 13.3, WatchOS 9.4, tvOS 16.4, and HomePod software version 16.4.
    Perhaps most importantly, there's a long list of security fixes included in Monday's updates.
    Apple's security site was updated shortly after the new software was released, detailing over 30 security issues that were fixed for the iPhone and iPad alone.

    https://www.macworld.com/article/1481562/ios-16-4-release-features-emoji-install.html
    iOS 16.4 includes more than 30 security updates, including several that could be deemed high-risk, all found by independent security researchers.

    Among the flaws patched:
    Calendar
    Impact: Importing a maliciously crafted calendar invitation may exfiltrate user information
    Description: Multiple validation issues were addressed with improved input sanitization.
    CVE-2023-27961: Found by Rąza Sabuncu (@rizasabuncu)

    Find My
    Impact: An app may be able to read sensitive location information
    Description: A privacy issue was addressed with improved private data redaction for log entries.
    CVE-2023-23537: Found by an anonymous researcher

    WebKit
    Impact: A website may be able to track sensitive user information
    Description: The issue was addressed by removing origin information. CVE-2023-27954: Found by an anonymous researcher

    https://support.apple.com/en-us/HT213673
    About the security content of iOS 15.7.4 and iPadOS 15.7.4
    Released March 27, 2023

    Accessibility
    Available for: iPhone 6s (all models), iPhone 7 (all models), iPhone SE (1st generation), iPad Air 2, iPad mini (4th generation), and iPod touch (7th generation)
    Impact: An app may be able to access information about a user's contacts Description: A privacy issue was addressed with improved private data redaction for log entries.
    CVE-2023-23541: Found by Csaba Fitzl (@theevilbit) of Offensive Security

    Calendar
    Available for: iPhone 6s (all models), iPhone 7 (all models), iPhone SE (1st generation), iPad Air 2, iPad mini (4th generation), and iPod touch (7th generation)
    Impact: Importing a maliciously crafted calendar invitation may exfiltrate user information
    Description: Multiple validation issues were addressed with improved input sanitization.
    CVE-2023-27961: Found by Riza Sabuncu (@rizasabuncu)

    Camera
    Available for: iPhone 6s (all models), iPhone 7 (all models), iPhone SE (1st generation), iPad Air 2, iPad mini (4th generation), and iPod touch (7th generation)
    Impact: A sandboxed app may be able to determine which app is currently using the camera
    Description: The issue was addressed with additional restrictions on the observability of app states.
    CVE-2023-23543: Found by Yigit Can YILMAZ (@yilmazcanyigit)

    CommCenter
    Available for: iPhone 6s (all models), iPhone 7 (all models), iPhone SE (1st generation), iPad Air 2, iPad mini (4th generation), and iPod touch (7th generation)
    Impact: An app may be able to cause unexpected system termination or write kernel memory
    Description: An out-of-bounds write issue was addressed with improved input validation.
    CVE-2023-27936: Found by Tingting Yin of Tsinghua University

    Find My
    Available for: iPhone 6s (all models), iPhone 7 (all models), iPhone SE (1st generation), iPad Air 2, iPad mini (4th generation), and iPod touch (7th generation)
    Impact: An app may be able to read sensitive location information
    Description: A privacy issue was addressed with improved private data redaction for log entries.
    CVE-2023-23537: Found by an anonymous researcher

    FontParser
    Available for: iPhone 6s (all models), iPhone 7 (all models), iPhone SE (1st generation), iPad Air 2, iPad mini (4th generation), and iPod touch (7th generation)
    Impact: Processing a maliciously crafted image may result in disclosure of process memory
    Description: The issue was addressed with improved memory handling. CVE-2023-27956: Found by Ye Zhang of Baidu Security

    Identity Services
    Available for: iPhone 6s (all models), iPhone 7 (all models), iPhone SE (1st generation), iPad Air 2, iPad mini (4th generation), and iPod touch (7th generation)
    Impact: An app may be able to access information about a user's contacts Description: A privacy issue was addressed with improved private data redaction for log entries.
    CVE-2023-27928: Found by Csaba Fitzl (@theevilbit) of Offensive Security

    ImageIO
    Available for: iPhone 6s (all models), iPhone 7 (all models), iPhone SE (1st generation), iPad Air 2, iPad mini (4th generation), and iPod touch (7th generation)
    Impact: Processing a maliciously crafted file may lead to unexpected app termination or arbitrary code execution
    Description: An out-of-bounds read was addressed with improved bounds checking. CVE-2023-27946: Found by Mickey Jin (@patch1t)

    ImageIO
    Available for: iPhone 6s (all models), iPhone 7 (all models), iPhone SE (1st generation), iPad Air 2, iPad mini (4th generation), and iPod touch (7th generation)
    Impact: Processing a maliciously crafted image may result in disclosure of process memory
    Description: The issue was addressed with improved memory handling. CVE-2023-23535: Found by ryuzaki

    Kernel
    Available for: iPhone 6s (all models), iPhone 7 (all models), iPhone SE (1st generation), iPad Air 2, iPad mini (4th generation), and iPod touch (7th generation)
    Impact: An app may be able to disclose kernel memory
    Description: A validation issue was addressed with improved input sanitization. CVE-2023-27941: Found by Arsenii Kostromin (0x3c3e)

    Kernel
    Available for: iPhone 6s (all models), iPhone 7 (all models), iPhone SE (1st generation), iPad Air 2, iPad mini (4th generation), and iPod touch (7th generation)
    Impact: An app may be able to execute arbitrary code with kernel privileges Description: A use after free issue was addressed with improved memory management.
    CVE-2023-27969: Found by Adam Doupe of ASU SEFCOM

    Model I/O
    Available for: iPhone 6s (all models), iPhone 7 (all models), iPhone SE (1st generation), iPad Air 2, iPad mini (4th generation), and iPod touch (7th generation)
    Impact: Processing a maliciously crafted file may lead to unexpected app termination or arbitrary code execution
    Description: An out-of-bounds read was addressed with improved input validation.
    CVE-2023-27949: Found by Mickey Jin (@patch1t)

    NetworkExtension
    Available for: iPhone 6s (all models), iPhone 7 (all models), iPhone SE (1st generation), iPad Air 2, iPad mini (4th generation), and iPod touch (7th generation)
    Impact: A user in a privileged network position may be able to spoof a VPN server that is configured with EAP-only authentication on a device
    Description: The issue was addressed with improved authentication. CVE-2023-28182: Found by Zhuowei Zhang

    Shortcuts
    Available for: iPhone 6s (all models), iPhone 7 (all models), iPhone SE (1st generation), iPad Air 2, iPad mini (4th generation), and iPod touch (7th generation)
    Impact: A shortcut may be able to use sensitive data with certain actions without prompting the user
    Description: The issue was addressed with additional permissions checks. CVE-2023-27963: Found by Jubaer Alnazi Jabin of TRS Group Of Companies, and Wenchao Li and Xiaolong Bai of Alibaba Group

    WebKit
    Available for: iPhone 6s (all models), iPhone 7 (all models), iPhone SE (1st generation), iPad Air 2, iPad mini (4th generation), and iPod touch (7th generation)
    Impact: A website may be able to track sensitive user information
    Description: The issue was addressed by removing origin information.
    WebKit Bugzilla: 250837
    CVE-2023-27954: Found by an anonymous researcher

    WebKit
    Available for: iPhone 6s (all models), iPhone 7 (all models), iPhone SE (1st generation), iPad Air 2, iPad mini (4th generation), and iPod touch (7th generation)
    Impact: Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
    Description: A type confusion issue was addressed with improved checks.
    WebKit Bugzilla: 251944
    CVE-2023-23529: Found by an anonymous researcher

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From sms@21:1/5 to NewsKrawler on Tue Mar 28 11:06:58 2023
    On 3/27/2023 10:33 PM, NewsKrawler wrote:
    https://www.zdnet.com/article/its-time-to-update-all-of-your-apple-devices-again-heres-why/
    It's time to update all of your Apple devices again based on new bugs found by many independent security researchers.

    Apple just released iOS 16.4 with over 30 security fixes iPhone, alongside updates for Mac, iPad and more.

    Note that 15.74 for older devices was also released. Requested it at
    10:18 a.m. for my iPhone 6s Plus
    "Preparing Update" finished at 10:31 (13 minutes)
    "Verifying Update" finished at 10:33 (2 minutes)
    Installing update (phone not usable during this time) finished at
    10:42 (9 minutes)
    Total time: 24 minutes

    On my iPad Pro I began the 16.4 update at 10:22
    "Preparing Update" finished at 10:54 (32 minutes)
    "Verifying Update" finished at 10:55 (1 minutes)
    Installing update (tablet not usable during this time) finished at
    11:04 (9 minutes)
    Total time: 42 minutes

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Peter@21:1/5 to sms on Tue Mar 28 19:40:04 2023
    sms <scharf.steven@geemail.com> wrote:

    On 3/27/2023 10:33 PM, NewsKrawler wrote:
    https://www.zdnet.com/article/its-time-to-update-all-of-your-apple-devices-again-heres-why/
    It's time to update all of your Apple devices again based on new bugs found by many independent security researchers.

    Apple just released iOS 16.4 with over 30 security fixes iPhone, alongside updates for Mac, iPad and more.

    Note that 15.74 for older devices was also released. Requested it at
    10:18 a.m. for my iPhone 6s Plus
    "Preparing Update" finished at 10:31 (13 minutes)
    "Verifying Update" finished at 10:33 (2 minutes)
    Installing update (phone not usable during this time) finished at
    10:42 (9 minutes)
    Total time: 24 minutes

    On my iPad Pro I began the 16.4 update at 10:22
    "Preparing Update" finished at 10:54 (32 minutes)
    "Verifying Update" finished at 10:55 (1 minutes)
    Installing update (tablet not usable during this time) finished at 11:04 (9 minutes)
    Total time: 42 minutes

    Note that Apple says only one release, which is iOS 16, is fully patched.

    Which means those on iOS 15.anything are almost certainly very vulnerable.

    Apple recommends anyone NOT able to be on iOS 16 should buy a new device.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)