Apple patches the whole lot, lastly reveals thriller of iOS 16.1.2 – Bare Safety


Apple has simply printed a wide selection of safety fixes for all its supported platforms, from the smallest watch to the most important laptop computer.

In different phrases, if you happen to’ve received an Apple product, and it’s nonetheless formally supported, we urge you to do an replace examine now.

Keep in mind that even if you happen to’ve set your iDevices to replace fully routinely, doing a guide examine continues to be nicely value it, as a result of:

  • It ensures that you simply catch up if one thing went fallacious together with your final computerized replace.
  • It jumps you to the pinnacle of the queue in order that even if you happen to haven’t but been alerted to the replace by Apple, you’ll have the ability to get it without delay anyway.

What you want

To summarise, the variations you wish to see after you’ve upgraded are as follows:

  • macOS Ventura 13.1
  • macOS Monterey 12.6.2
  • macOS Large Sur 11.7.2
  • tvOS 16.2
  • watchOS 9.2
  • iOS 16.2 (current units solely)
  • iPadOS 16.2 (current units solely)
  • iOS 15.7.2 (earlier units, again to iPhone 6s)
  • iPadOS 15.7.2 (earlier units, together with iPod contact seventh gen)

In case you’ve received Large Sur or Monterey, you’ll additionally want a separate replace to take you to Safari 16.2 to repair numerous browser and web-rendering bugs. (Different platform updates get their Safari fixes bundled in.)

Thriller defined

Amusingly, if that’s the proper phrase, a few of the the thriller surrounding Apple’s current iOS 16.1.2 replace, which got here out all by itself, with no supporting documentation in any respect, has belatedly been revealed:

A bug in WebKit, Apple’s net rendering engine, often known as CVE-2022-42856, apparently confirmed up in an exploit getting used within the wild, and though that bug has now been patched in all of the abovementioned updates (besides watchOS)…

…it appears that evidently the recognized exploit solely labored on iOS.

After all, on condition that the replace advisories now explicitly state that the exploit truly solely labored “in opposition to variations of iOS launched earlier than iOS 15.1”, we nonetheless don’t know why iOS 16 customers received an replace whereas iOS 15 customers didn’t.

Maybe Apple hoped that some customers who had been nonetheless again on iOS 15, and thus probably weak, would leap to iOS 16 and get themselves as up-to-date as attainable?

Or maybe the iOS 16.1.2 replace was merely a precaution that took much less time to push out than it did for Apple to make sure that iOS 16 was not, actually, in danger?

What to do?

  • In your iPhone or iPad: Settings > Common > Software program Replace
  • In your Mac: Apple menu > About this Mac > Software program Replace…


Leave a Reply