IOS 14.4.1 is the current publicly available version of iOS that people can download, but Apple has also provided iOS 14.5 to developers and public beta testers for testing purposes.
IOS 14.4.1 was a security fix update that addressed a WebKit vulnerability that could allow maliciously crafted web content to execute code.
With the software no longer being signed, it is no longer possible to downgrade from iOS 14.4.1 to iOS 14.4 if you've already upgraded your iPhone or iPad.Īpple routinely stops signing older versions of software updates after new releases come out in order to encourage customers to keep their operating systems up to date.
Impact: A remote attacker may be able to cause unexpected application termination or arbitrary code executionĬVE-2021-1818: Xingwei Lin of Ant-Financial Light-Year Security LabFollowing the release of iOS 14.4.1 on March 8, Apple has stopped signing iOS 14.4, the previous version of iOS 14. Impact: Processing a maliciously crafted image may lead to a denial of serviceĬVE-2021-1773: Xingwei Lin of Ant Security Light-Year LabĬVE-2021-1766: Danny Rosseau of Carve SystemsĬVE-2021-1785: Xingwei Lin of Ant Security Light-Year LabĬVE-2021-1737: Xingwei Lin of Ant Security Light-Year LabĬVE-2021-1744: Xingwei Lin of Ant Security Light-Year Lab This was addressed with improved input validation.ĬVE-2021-1791: Junzhi Qi Sun and Mickey Jin of Trend Micro working with Trend Micro’s Zero Day Initiative Impact: A malicious application may be able to disclose kernel memoryĭescription: An out-of-bounds read issue existed that led to the disclosure of kernel memory. Impact: A local attacker may be able to elevate their privilegesĭescription: Multiple issues were addressed with improved logic. Impact: A local user may be able to create or modify system filesĭescription: A logic issue was addressed with improved state management.ĬVE-2021-1786: Csaba Fitzl of Offensive Security Impact: Processing a maliciously crafted text file may lead to arbitrary code executionĭescription: A stack overflow was addressed with improved input validation.ĬVE-2021-1772: Mickey Jin of Trend Micro working with Trend Micro’s Zero Day InitiativeĮntry added February 1, 2021, updated May 28, 2021ĭescription: An out-of-bounds read was addressed with improved bounds checking.ĬVE-2021-1792: Mickey Jin & Junzhi Lu of Trend Micro working with Trend Micro’s Zero Day Initiative Impact: Processing a maliciously crafted image may lead to arbitrary code executionĬVE-2021-1759: Hou JingYi of Qihoo 360 CERT Impact: Processing a maliciously crafted font file may lead to arbitrary code executionĭescription: An out-of-bounds write issue was addressed with improved bounds checking.ĬVE-2021-1776: Ivan Fratric of Google Project Zero Impact: Processing maliciously crafted web content may lead to code executionĬVE-2021-1747: JunDong Xie of Ant Security Light-Year Lab Impact: A malicious application could execute arbitrary code leading to compromise of user informationĭescription: A memory corruption issue was addressed with improved state management.
Impact: An attacker in a privileged position may be able to perform a denial of service attackĭescription: A memory initialization issue was addressed with improved memory handling.ĬVE-2021-1780: Jianjun Dai of 360 Alpha Lab
Impact: A remote attacker may be able to cause arbitrary code executionĭescription: An out-of-bounds read was addressed with improved input validation.ĬVE-2021-1794: Jianjun Dai of 360 Alpha Labĭescription: An out-of-bounds write was addressed with improved input validation.ĬVE-2021-1795: Jianjun Dai of 360 Alpha LabĬVE-2021-1796: Jianjun Dai of 360 Alpha Lab
Impact: A local user may be able to read arbitrary filesĭescription: The issue was addressed with improved permissions logic.Īvailable for: iPhone 6s and later, iPad Pro (all models), iPad Air 2 and later, iPad 5th generation and later, iPad mini 4 and later, and iPod touch (7th generation) Impact: A remote attacker may be able to cause a denial of serviceĭescription: This issue was addressed with improved checks.Įntry added February 1, 2021, updated May 28, 2021
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2 and later, iPad 5th generation and later, iPad mini 4 and later, and iPod touch (7th generation)