Update July 12 , 2023 : Apple has issue iOS 16.5.1 ( c ) , iPadOS 16.5.1 ( blow ) , and macOS 13.4.1 ( vitamin C ) to address this critical WebKit vulnerability without break several pop apps .

Earlier this week , Apple pushed out “ ( a ) ” updates for iOS 16.5.1 , iPadOS 16.5.1 , and macOS 13.4.1 , using the Rapid Security Response system launchedat the starting of May . These emergency update appear to have been mean to piece a single WebKit flaw that had reportedly been actively exploited .

The rum thing , however , was that Apple thenpulled the updatejust hour after it appear . And now we have a clean idea of why .

Article image

In a newsupport text file , the caller addresses exploiter who utilize the updates , acknowledging that it is “ aware of ” of a problem that “ might forestall some websites from expose properly . ” It might be reason that this understate the severity of the bug , which according to story from meeting place users “ broke sure apps such as Facebook , Instagram , Zoom to name a few . ”

Apple has pulled the Rapid Security Responses released earlier today . There are reports on the MacRumors forums that it broke sure apps such as Facebook , Instagram , Zoom to name a few .

In terms of solutions , Apple offers the round-eyed remedy of removing the updates , and offers simple education in the support document . On iPhone or iPad , you should reach the configurations app then go toAbout > iOS Version , tapRemove Security Responsethen tapRemoveto confirm . On a Mac you need to go to the Apple fare > About this Mac , clickMore Info , then under macOS , click theInfobutton next to the translation number . ClickRemove and Restartthen confirm .

Users may feel ambivalent about removing a patch which had been deemed sufficiently urgent to merit a Rapid Security Response , but Apple promise that ( b ) version of the three updates “ will be uncommitted soon to accost this issue . ”