Skip to content
Menu
  • Home
  • Tips
  • Security
  • Hardware
    • Mac
    • iPhone
    • iPad
    • Apple Watch
    • Vision Pro
    • Apple TV
    • Accessories
  • Software
    • macOS
    • iOS
    • iPadOS
    • visionOS
    • watchOS
    • tvOS
    • Apps
  • Buying Guides
    • How to choose a Mac laptop
    • How to choose a desktop Mac
    • Laptop vs desktop – how to decide
    • How to choose an Apple Watch
  • About
  • RSS

Apple squashes bugs with security updates for macOS 12 Monterey, macOS 11 Big Sur and iOS and iPadOS 15

Posted on April 11, 2023April 11, 2023
Share on Social Media
x facebook linkedin reddit email

macOS Monterey 12.6.5 and macOS Big Sur 11.7.6 are the latest updates released by Apple for prior MacOS releases. While these lack the new emojis related with macOS Ventura 13.3.1, Big Sur and Monterey do get the security fixes. iOS 15.7.5 for iPhone and iPadOS 15.7.5 for iPad have also been released and include important security updates.

What’s been fixed in macOS Big Sur 11.7.6 and macOS Monterey 12.6.5

Impact: An app may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited.

Description: An out-of-bounds write issue was addressed with improved input validation.

CVE-2023-28206: Clément Lecigne of Google’s Threat Analysis Group and Donncha Ó Cearbhaill of Amnesty International’s Security Lab

What’s been fixed in iOS 15.7.5 and iPadOS 15.7.5

Available for: iPhone 6s (all models), iPhone 7 (all models), iPhone SE (1st generation), iPad Air 2, iPad mini (4th generation), and iPod touch (7th generation)

Impact: An app may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited.

Description: An out-of-bounds write issue was addressed with improved input validation.

CVE-2023-28206: Clément Lecigne of Google’s Threat Analysis Group and Donncha Ó Cearbhaill of Amnesty International’s Security Lab

Available for: iPhone 6s (all models), iPhone 7 (all models), iPhone SE (1st generation), iPad Air 2, iPad mini (4th generation), and iPod touch (7th generation)

Impact: Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.

Description: A use after free issue was addressed with improved memory management.

CVE-2023-28205: Clément Lecigne of Google’s Threat Analysis Group and Donncha Ó Cearbhaill of Amnesty International’s Security Lab

Anthony Caruana

Anthony is the founder of Australian Apple News. He is a long-time Apple user and former editor of Australian Macworld. He has contributed to many technology magazines and newspapers as well as appearing regularly on radio and occasionally on TV.

Share this:

  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on X (Opens in new window) X

Related

No authorisation is provided for the content on the site to be scraped or otherwise used for the training of machine learning, AI models or any other reuse without the express written permission of the site owner.

AI Apple Apple Intelligence Apple Silicon apple tv apple watch Apple Watch se Apple Watch ultra App Store augmented reality EU European Union folding iPhone health icloud iMac iOS iOS 16 iPad iPad air iPad mini ipados iPad Pro iphone iPhone 14 iPhone 15 iPhone 15 Pro iPhone se M2 Mac MacBook Air MacBook Pro Mac mini macOS Mac Studio privacy regulation rumours Security Siri software update USB-C vision pro watchos WWDC 2023

©2025 | WordPress Theme by Superb WordPress Themes