Rocksolid Light

Welcome to novaBBS (click a section below)

mail  files  register  newsreader  groups  login

Message-ID:  

6 May, 2024: The networking issue during the past two days has been identified and appears to be fixed. Will keep monitoring.


computers / comp.sys.mac.system / Today Apple released iOS 16.4 with over 30 security fixes found by independent security researchers

SubjectAuthor
o Today Apple released iOS 16.4 with over 30 security fixes found by independent sNewsKrawler

1
Today Apple released iOS 16.4 with over 30 security fixes found by independent security researchers

<tvtu31$moni$1@paganini.bofh.team>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=15693&group=comp.sys.mac.system#15693

  copy link   Newsgroups: comp.sys.mac.system
Path: i2pn2.org!i2pn.org!paganini.bofh.team!not-for-mail
From: newskr...@krawl.org (NewsKrawler)
Newsgroups: comp.sys.mac.system
Subject: Today Apple released iOS 16.4 with over 30 security fixes found by independent security researchers
Date: Tue, 28 Mar 2023 05:31:14 -0000 (UTC)
Organization: To protect and to server
Message-ID: <tvtu31$moni$1@paganini.bofh.team>
Injection-Date: Tue, 28 Mar 2023 05:31:14 -0000 (UTC)
Injection-Info: paganini.bofh.team; logging-data="746226"; posting-host="dCc0u5T/G87ZM4JysRyXPQ.user.paganini.bofh.team"; mail-complaints-to="usenet@bofh.team"; posting-account="9dIQLXBM7WM9KzA+yjdR4A";
Cancel-Lock: sha256:4GX5c08qSwxFTWEiVg4whUSE2ZOx/QrKL6QeRL9whys=
X-Notice: Filtered by postfilter v. 0.9.3
 by: NewsKrawler - Tue, 28 Mar 2023 05:31 UTC

https://www.zdnet.com/article/its-time-to-update-all-of-your-apple-devices-again-heres-why/
It's time to update all of your Apple devices again based on new bugs found
by many independent security researchers.

Apple just released iOS 16.4 with over 30 security fixes iPhone, alongside
updates for Mac, iPad and more.

Today Apple released iOS 16.4, iPadOS 16.4, MacOS 13.3, WatchOS 9.4, tvOS
16.4, and HomePod software version 16.4.
Perhaps most importantly, there's a long list of security fixes included in
Monday's updates.
Apple's security site was updated shortly after the new software was
released, detailing over 30 security issues that were fixed for the iPhone
and iPad alone.

https://www.macworld.com/article/1481562/ios-16-4-release-features-emoji-install.html
iOS 16.4 includes more than 30 security updates, including several that
could be deemed high-risk, all found by independent security researchers.

Among the flaws patched:
Calendar
Impact: Importing a maliciously crafted calendar invitation may exfiltrate
user information
Description: Multiple validation issues were addressed with improved input
sanitization.
CVE-2023-27961: R�za Sabuncu (@rizasabuncu)

Find My
Impact: An app may be able to read sensitive location information
Description: A privacy issue was addressed with improved private data
redaction for log entries.
CVE-2023-23537: an anonymous researcher

WebKit
Impact: A website may be able to track sensitive user information
Description: The issue was addressed by removing origin information.
CVE-2023-27954: an anonymous researcher

https://support.apple.com/en-us/HT213673
About the security content of iOS 15.7.4 and iPadOS 15.7.4
Released March 27, 2023

Accessibility
Available for: iPhone 6s (all models), iPhone 7 (all models), iPhone SE
(1st generation), iPad Air 2, iPad mini (4th generation), and iPod touch
(7th generation)
Impact: An app may be able to access information about a user's contacts
Description: A privacy issue was addressed with improved private data
redaction for log entries.
CVE-2023-23541: Csaba Fitzl (@theevilbit) of Offensive Security

Calendar
Available for: iPhone 6s (all models), iPhone 7 (all models), iPhone SE
(1st generation), iPad Air 2, iPad mini (4th generation), and iPod touch
(7th generation)
Impact: Importing a maliciously crafted calendar invitation may exfiltrate
user information
Description: Multiple validation issues were addressed with improved input
sanitization.
CVE-2023-27961: Riza Sabuncu (@rizasabuncu)

Camera
Available for: iPhone 6s (all models), iPhone 7 (all models), iPhone SE
(1st generation), iPad Air 2, iPad mini (4th generation), and iPod touch
(7th generation)
Impact: A sandboxed app may be able to determine which app is currently
using the camera
Description: The issue was addressed with additional restrictions on the
observability of app states.
CVE-2023-23543: Yigit Can YILMAZ (@yilmazcanyigit)

CommCenter
Available for: iPhone 6s (all models), iPhone 7 (all models), iPhone SE
(1st generation), iPad Air 2, iPad mini (4th generation), and iPod touch
(7th generation)
Impact: An app may be able to cause unexpected system termination or write
kernel memory
Description: An out-of-bounds write issue was addressed with improved input
validation.
CVE-2023-27936: Tingting Yin of Tsinghua University

Find My
Available for: iPhone 6s (all models), iPhone 7 (all models), iPhone SE
(1st generation), iPad Air 2, iPad mini (4th generation), and iPod touch
(7th generation)
Impact: An app may be able to read sensitive location information
Description: A privacy issue was addressed with improved private data
redaction for log entries.
CVE-2023-23537: an anonymous researcher

FontParser
Available for: iPhone 6s (all models), iPhone 7 (all models), iPhone SE
(1st generation), iPad Air 2, iPad mini (4th generation), and iPod touch
(7th generation)
Impact: Processing a maliciously crafted image may result in disclosure of
process memory
Description: The issue was addressed with improved memory handling.
CVE-2023-27956: Ye Zhang of Baidu Security

Identity Services
Available for: iPhone 6s (all models), iPhone 7 (all models), iPhone SE
(1st generation), iPad Air 2, iPad mini (4th generation), and iPod touch
(7th generation)
Impact: An app may be able to access information about a user's contacts
Description: A privacy issue was addressed with improved private data
redaction for log entries.
CVE-2023-27928: Csaba Fitzl (@theevilbit) of Offensive Security

ImageIO
Available for: iPhone 6s (all models), iPhone 7 (all models), iPhone SE
(1st generation), iPad Air 2, iPad mini (4th generation), and iPod touch
(7th generation)
Impact: Processing a maliciously crafted file may lead to unexpected app
termination or arbitrary code execution
Description: An out-of-bounds read was addressed with improved bounds
checking.
CVE-2023-27946: Mickey Jin (@patch1t)

ImageIO
Available for: iPhone 6s (all models), iPhone 7 (all models), iPhone SE
(1st generation), iPad Air 2, iPad mini (4th generation), and iPod touch
(7th generation)
Impact: Processing a maliciously crafted image may result in disclosure of
process memory
Description: The issue was addressed with improved memory handling.
CVE-2023-23535: ryuzaki

Kernel
Available for: iPhone 6s (all models), iPhone 7 (all models), iPhone SE
(1st generation), iPad Air 2, iPad mini (4th generation), and iPod touch
(7th generation)
Impact: An app may be able to disclose kernel memory
Description: A validation issue was addressed with improved input
sanitization.
CVE-2023-27941: Arsenii Kostromin (0x3c3e)

Kernel
Available for: iPhone 6s (all models), iPhone 7 (all models), iPhone SE
(1st generation), iPad Air 2, iPad mini (4th generation), and iPod touch
(7th generation)
Impact: An app may be able to execute arbitrary code with kernel privileges
Description: A use after free issue was addressed with improved memory
management.
CVE-2023-27969: Adam Doupe of ASU SEFCOM

Model I/O
Available for: iPhone 6s (all models), iPhone 7 (all models), iPhone SE
(1st generation), iPad Air 2, iPad mini (4th generation), and iPod touch
(7th generation)
Impact: Processing a maliciously crafted file may lead to unexpected app
termination or arbitrary code execution
Description: An out-of-bounds read was addressed with improved input
validation.
CVE-2023-27949: Mickey Jin (@patch1t)

NetworkExtension
Available for: iPhone 6s (all models), iPhone 7 (all models), iPhone SE
(1st generation), iPad Air 2, iPad mini (4th generation), and iPod touch
(7th generation)
Impact: A user in a privileged network position may be able to spoof a VPN
server that is configured with EAP-only authentication on a device
Description: The issue was addressed with improved authentication.
CVE-2023-28182: Zhuowei Zhang

Shortcuts
Available for: iPhone 6s (all models), iPhone 7 (all models), iPhone SE
(1st generation), iPad Air 2, iPad mini (4th generation), and iPod touch
(7th generation)
Impact: A shortcut may be able to use sensitive data with certain actions
without prompting the user
Description: The issue was addressed with additional permissions checks.
CVE-2023-27963: Jubaer Alnazi Jabin of TRS Group Of Companies, and Wenchao
Li and Xiaolong Bai of Alibaba Group

WebKit
Available for: iPhone 6s (all models), iPhone 7 (all models), iPhone SE
(1st generation), iPad Air 2, iPad mini (4th generation), and iPod touch
(7th generation)
Impact: A website may be able to track sensitive user information
Description: The issue was addressed by removing origin information.
WebKit Bugzilla: 250837
CVE-2023-27954: an anonymous researcher

WebKit
Available for: iPhone 6s (all models), iPhone 7 (all models), iPhone SE
(1st generation), iPad Air 2, iPad mini (4th generation), and iPod touch
(7th generation)
Impact: Processing maliciously crafted web content may lead to arbitrary
code execution. Apple is aware of a report that this issue may have been
actively exploited.
Description: A type confusion issue was addressed with improved checks.
WebKit Bugzilla: 251944
CVE-2023-23529: an anonymous researcher

1
server_pubkey.txt

rocksolid light 0.9.81
clearnet tor