It’s time to verify your software updates. March has seen the discharge of vital patches for Apple’s iOS, Google’s Chrome, and its privacy-conscious competitor Firefox. Bugs have additionally been squashed by enterprise software program giants together with Cisco, VMware, and SAP.
Right here’s what you’ll want to know concerning the safety updates issued in March.
Apple iOS
Apple made up for a quiet February by issuing two separate patches in March. At first of the month, the iPhone maker launched iOS 17.4, fixing over 40 flaws together with two points already being utilized in real-life assaults.
Tracked as CVE-2024-23225, the primary bug within the iPhone Kernel might permit an attacker to bypass reminiscence protections. “Apple is conscious of a report that this situation could have been exploited,” the iPhone maker stated on its support page.
Tracked as CVE-2024-23296, the second flaw, in RTKit, the real-time working system utilized in units together with AirPods, might additionally permit an adversary to bypass Kernel reminiscence protections.
Later in March, Apple launched a second software program replace, iOS 17.4.1, this time fixing two flaws in its iPhone software program, each tracked as CVE-2024-1580. Utilizing the problems patched in iOS 17.4.1, an attacker might execute code in the event that they satisfied somebody to work together with a picture.
Quickly after issuing iOS 17.4.1, Apple launched patches for its different units to repair the identical bugs: Safari 17.4.1, macOS Sonoma 14.4.1 and macOS Ventura 13.6.6.
Google Chrome
March was one other hectic month for Google, which patched a number of flaws in its Chrome browser. Mid-way by way of the month, Google released 12 patches, together with a repair for CVE-2024-2625, an object-lifecycle situation in V8 with a excessive severity score.
Medium-severity points embody CVE-2024-2626, an out-of-bounds learn bug in Swiftshader; CVE-2024-2627, a use-after-free flaw in Canvas; and CVE-2024-2628, an inappropriate implementation situation in Downloads.
On the finish of the month, Google issued seven safety fixes, together with a patch for a crucial use-after-free flaw in ANGLE tracked as CVE-2024-2883. Two additional use-after-free bugs, tracked as CVE-2024-2885 and CVE-2024-2886, got a high-severity score. In the meantime, CVE-2024-2887 is a type-confusion flaw in WebAssembly.
The final two points had been exploited on the Pwn2Own 2024 hacking contest, so it’s best to replace your Chrome browser ASAP.
Mozilla Firefox
Mozilla’s Firefox had a busy March, after patching two zero-day vulnerabilities exploited at Pwn2Own. CVE-2024-29943 is an out-of-bounds entry bypass situation, whereas CVE-2024-29944 is a privileged JavaScript Execution flaw in Occasion Handlers that would result in sandbox escape. Each points are rated as having a crucial impression.
Earlier within the month, Mozilla released Firefox 124 to handle 12 safety points, together with CVE-2024-2605, a sandbox-escape flaw affecting Home windows working methods. An attacker might have leveraged the Home windows Error Reporter to run arbitrary code on the system, escaping the sandbox, Mozilla stated.
CVE-2024-2615 sees critical-rated reminiscence security bugs mounted in Firefox 124. “A few of these bugs confirmed proof of reminiscence corruption, and we presume that with sufficient effort [they] might have been exploited to run arbitrary code,” Mozilla stated.
Google Android
Google has launched its March Android Security Bulletin, fixing almost 40 points in its cellular working system, together with two crucial bugs in its system element. CVE-2024-0039 is a distant code-execution flaw, whereas CVE-2024-23717 is an elevation-of-privilege vulnerability.
“Essentially the most extreme of those points is a crucial safety vulnerability within the System element that would result in distant code execution with no further execution privileges wanted,” Google stated in its advisory.
Discussion about this post