• @Knasen
    link
    108 months ago

    Wow!! That is pretty fuc*ed up: Impact: Processing an image may lead to arbitrary code execution

    • chiisana
      link
      fedilink
      38 months ago

      The very first jailbreak was from a similar exploit, so all someone has to do was visit a website via safari, drag the ever so familiar slide to unlock slider across, triggering the said image to be loaded, and jailbreak the device.

      Render time arbitrary execution bugs have also existed in fonts and other benign sounding media types, on all OS and platforms. This is really not that special and is just another high impact security bug that got patched.

        • chiisana
          link
          fedilink
          28 months ago

          I thought it was reference to tiff in a png? It’s been far too long, but you’re right, PDF was certainly also a vector in a slightly later incarnation I remember :)

  • @aeronmelon
    link
    78 months ago

    Just a rule of thumb; ALWAYS update your perpetually-connected internet devices when new security updates are pushed.