

Of these, CVE-2023-23529 is the chief threat. Apple is aware of a report that this issue may have been actively exploited.ĭescription: A type confusion issue was addressed with improved checks. Impact: Processing maliciously crafted web content may lead to arbitrary code execution. Impact: An app may be able to execute arbitrary code with kernel privilegesĭescription: A use after free issue was addressed with improved memory management.ĬVE-2023-23514: Xinru Chi of Pangu Lab, Ned Williamson of Google Project ZeroĪvailable for: iPhone 8 and later, iPad Pro (all models), iPad Air 3rd generation and later, iPad 5th generation and later, iPad mini 5th generation and later The latter is Apple’s latest attempt to refine its Crash Detection algorithm after the feature hit the news again this month for sending numerous false alerts to emergency responders.Īpple’s iOS 16.3.1 security page discloses that the update contains just two security patches: KernelĪvailable for: iPhone 8 and later, iPad Pro (all models), iPad Air 3rd generation and later, iPad 5th generation and later, and iPad mini 5th generation and later The former caused iCloud to stop syncing, putting user data at risk. The headline fixes here are for iCloud and Crash Detection. Crash Detection optimizations on iPhone 14 and iPhone 14 Pro models iCloud settings may be unresponsive or incorrectly display if apps are using iCloud

There are also several reports of upgraded devices experiencing degraded cellular signal ( 1, 2, 3, 4), though not enough to raise alarm bells at this stage.Īpple’s iOS 16.3.1 release notes list the following fixes: That said, I am seeing isolated reports of bugs in a number of areas, including print errors in Pages, app crashes, a battery-level reporting bug and issues connecting to WiFi.
