• @Knasen@lemmy.world
    link
    fedilink
    103 months ago

    Wow!! That is pretty fuc*ed up: Impact: Processing an image may lead to arbitrary code execution

    • chiisana
      link
      fedilink
      33 months ago

      The very first jailbreak was from a similar exploit, so all someone has to do was visit a website via safari, drag the ever so familiar slide to unlock slider across, triggering the said image to be loaded, and jailbreak the device.

      Render time arbitrary execution bugs have also existed in fonts and other benign sounding media types, on all OS and platforms. This is really not that special and is just another high impact security bug that got patched.

      • @gray
        link
        23 months ago

        It would load a PDF in safari. Back in the good old days of jailbreak.me.

        • chiisana
          link
          fedilink
          23 months ago

          I thought it was reference to tiff in a png? It’s been far too long, but you’re right, PDF was certainly also a vector in a slightly later incarnation I remember :)

  • @aeronmelon@lemmy.world
    link
    fedilink
    73 months ago

    Just a rule of thumb; ALWAYS update your perpetually-connected internet devices when new security updates are pushed.