this post was submitted on 26 Mar 2024
28 points (91.2% liked)

Apple

17482 readers
92 users here now

Welcome

to the largest Apple community on Lemmy. This is the place where we talk about everything Apple, from iOS to the exciting upcoming Apple Vision Pro. Feel free to join the discussion!

Rules:
  1. No NSFW Content
  2. No Hate Speech or Personal Attacks
  3. No Ads / Spamming
    Self promotion is only allowed in the pinned monthly thread

Lemmy Code of Conduct

Communities of Interest:

Apple Hardware
Apple TV
Apple Watch
iPad
iPhone
Mac
Vintage Apple

Apple Software
iOS
iPadOS
macOS
tvOS
watchOS
Shortcuts
Xcode

Community banner courtesy of u/Antsomnia.

founded 1 year ago
MODERATORS
top 5 comments
sorted by: hot top controversial new old
[–] Knasen@lemmy.world 10 points 7 months ago (1 children)

Wow!! That is pretty fuc*ed up: Impact: Processing an image may lead to arbitrary code execution

[–] chiisana@lemmy.chiisana.net 3 points 7 months ago (1 children)

The very first jailbreak was from a similar exploit, so all someone has to do was visit a website via safari, drag the ever so familiar slide to unlock slider across, triggering the said image to be loaded, and jailbreak the device.

Render time arbitrary execution bugs have also existed in fonts and other benign sounding media types, on all OS and platforms. This is really not that special and is just another high impact security bug that got patched.

[–] gray@pawb.social 2 points 7 months ago (1 children)

It would load a PDF in safari. Back in the good old days of jailbreak.me.

[–] chiisana@lemmy.chiisana.net 2 points 7 months ago

I thought it was reference to tiff in a png? It's been far too long, but you're right, PDF was certainly also a vector in a slightly later incarnation I remember :)

[–] aeronmelon@lemmy.world 7 points 7 months ago

Just a rule of thumb; ALWAYS update your perpetually-connected internet devices when new security updates are pushed.