Home  >  Article  >  Mobile Tutorial  >  What vulnerabilities are fixed in the official version of iOS/iPadOS 16.7? Is the update worth it?

What vulnerabilities are fixed in the official version of iOS/iPadOS 16.7? Is the update worth it?

王林
王林forward
2024-01-14 18:03:301085browse

On the day the Apple iPhone 15 series was released, Apple released three system versions: iOS/iPadOS 17.0.1, iOS/iPadOS 17.0.2, and iOS/iPadOS 16.7.


The internal version number of this iOS/iPadOS 16.7 system update is 20H19. The official introduction is: "This update provides important bug fixes and security updates. , recommended for all users to install."


苹果发布 iOS / iPadOS 16.7正式版修复了哪些漏洞?值得更新吗?


The following are the key fixes of this update found in Apple’s official support documents Three vulnerabilities:


  • CVE-2023-41992: A local attacker can escalate his or her privileges.

  • CVE-2023-41991: Malware can bypass signature verification.

  • CVE-2023-41993: A vulnerability in the processing of web content could allow execution of arbitrary code.


In addition, Apple today also released macOS Monterey 12.7, macOS Ventura 13.6 and other system updates, which also fix the above problems.


The official version of iOS / iPadOS 16.7 supports the following model upgrades:

iPhone X

iPhone 8 Plus

iPhone 8

iPad Pro (12.9 inches) 1st generation

iPad Pro (9.7 inches) 1st generation

iPad 5th generation


The new iPhone 15 series has been released. Apple has focused on iOS17 a few months ago. iOS/iPadOS 16.7 is likely to be the last major version update of iOS/iPadOS 16.


After a long period of repairs and improvements, iOS/iPadOS 16 has become more and more stable and has few bugs. If your old device feels unusable after upgrading to iOS17, it is better to choose iOS/iPadOS 16.7 for retirement.

The above is the detailed content of What vulnerabilities are fixed in the official version of iOS/iPadOS 16.7? Is the update worth it?. For more information, please follow other related articles on the PHP Chinese website!

Statement:
This article is reproduced at:i4.cn. If there is any infringement, please contact admin@php.cn delete