Skip to content
Menu
  • Home
  • Subscribe
    • Newsletter Archive
  • Tips
  • Reviews
  • Hardware
    • Mac
    • iPhone
    • iPad
    • Apple Watch
    • Vision Pro
    • Apple TV
    • Accessories
  • Software
    • macOS
    • iOS
    • iPadOS
    • visionOS
    • watchOS
    • tvOS
    • Apps
  • About
  • RSS

Apple squashes bugs with security updates for macOS 12 Monterey, macOS 11 Big Sur and iOS and iPadOS 15

Posted on April 11, 2023April 11, 2023
Share on Social Media
xfacebooklinkedinredditemail

macOS Monterey 12.6.5 and macOS Big Sur 11.7.6 are the latest updates released by Apple for prior MacOS releases. While these lack the new emojis related with macOS Ventura 13.3.1, Big Sur and Monterey do get the security fixes. iOS 15.7.5 for iPhone and iPadOS 15.7.5 for iPad have also been released and include important security updates.

What’s been fixed in macOS Big Sur 11.7.6 and macOS Monterey 12.6.5

Impact: An app may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited.

Description: An out-of-bounds write issue was addressed with improved input validation.

CVE-2023-28206: Clément Lecigne of Google’s Threat Analysis Group and Donncha Ó Cearbhaill of Amnesty International’s Security Lab

What’s been fixed in iOS 15.7.5 and iPadOS 15.7.5

Available for: iPhone 6s (all models), iPhone 7 (all models), iPhone SE (1st generation), iPad Air 2, iPad mini (4th generation), and iPod touch (7th generation)

Impact: An app may be able to execute arbitrary code with kernel privileges. Apple is aware of a report that this issue may have been actively exploited.

Description: An out-of-bounds write issue was addressed with improved input validation.

CVE-2023-28206: Clément Lecigne of Google’s Threat Analysis Group and Donncha Ó Cearbhaill of Amnesty International’s Security Lab

Available for: iPhone 6s (all models), iPhone 7 (all models), iPhone SE (1st generation), iPad Air 2, iPad mini (4th generation), and iPod touch (7th generation)

Impact: Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.

Description: A use after free issue was addressed with improved memory management.

CVE-2023-28205: Clément Lecigne of Google’s Threat Analysis Group and Donncha Ó Cearbhaill of Amnesty International’s Security Lab

Anthony Caruana

Anthony is the founder of Australian Apple News. He is a long-time Apple user and former editor of Australian Macworld. He has contributed to many technology magazines and newspapers as well as appearing regularly on radio and occasionally on TV.

Share this:

  • Share on Facebook (Opens in new window) Facebook
  • Share on X (Opens in new window) X

Like this:

Like Loading...

Related

Sign up for Australian Apple News

* = required field
unsubscribe from list

Buying Guides

  • How to choose an iPhone
  • How to choose an iPad
  • How to choose a Mac laptop
  • How to choose a desktop Mac
  • How to choose an Apple Watch
  • Laptop v Desktop

Latest reviews

  • Review: Bevel - a health app that ticks almost all the boxes
  • Review - Zenni lenses for Meta Quest 3
  • Review: Mac-Case Premium Leather MacBook Pro Case

Latest tips

  • How to record iPhone videos directly to an external drive
  • Finding and fixing duplicate images in Photos
  • Can an iPad mini replace a proper computer?

Latest news

  • Apple introduces new AirTag
  • Australia holds position on global broadband speed rankings
  • TGA approves Apple Watch hypertension alerts

©2026 | WordPress Theme by Superb WordPress Themes
%d