• Knasen@lemmy.world
    link
    fedilink
    arrow-up
    10
    ·
    3 months ago

    Wow!! That is pretty fuc*ed up: Impact: Processing an image may lead to arbitrary code execution

    • chiisana@lemmy.chiisana.net
      link
      fedilink
      arrow-up
      3
      ·
      3 months ago

      The very first jailbreak was from a similar exploit, so all someone has to do was visit a website via safari, drag the ever so familiar slide to unlock slider across, triggering the said image to be loaded, and jailbreak the device.

      Render time arbitrary execution bugs have also existed in fonts and other benign sounding media types, on all OS and platforms. This is really not that special and is just another high impact security bug that got patched.

  • aeronmelon@lemmy.world
    link
    fedilink
    arrow-up
    7
    ·
    3 months ago

    Just a rule of thumb; ALWAYS update your perpetually-connected internet devices when new security updates are pushed.