What you need to know
- iOS 15.0.2 has been released to the public.
- The latest update addresses a security vulnerability that was actively exploited.
- It also fixes a number of bugs.
iOS 15.0.2 not only fixes a ton of bugs but an actively exploited security issue as well.
Today, Apple rolled out iOS 15.0.2 to all users with a compatible iPhone. The update brought with it a number of bug fixes including issues between AirTag or the new MagSafe Wallet with the Find My app as well as CarPlay disconnecting when playing audio. It also fixed an issue where photos would be removed from the Photos app after deleting a conversation in Messages.
In addition to all of these notable bug fixes, the latest update also patched a security issue that, according to Apple, was actively exploited in at least one case.
Posted to the Apple Support (opens in new tab) website, Apple says that "improved memory handling" has addressed a security vulnerability where "an application may be able to execute arbitrary code with kernel privileges."
iOS 15.0.2 comes a week after Apple rolled out iOS 15.0.1 to its users. It's very common for the company to quickly release a number of small updates to its operating system after a major release to address the expected bugs.
Joe Wituschek is a Contributor at iMore. With over ten years in the technology industry, one of them being at Apple, Joe now covers the company for the website. In addition to covering breaking news, Joe also writes editorials and reviews for a range of products. He fell in love with Apple products when he got an iPod nano for Christmas almost twenty years ago. Despite being considered a "heavy" user, he has always preferred the consumer-focused products like the MacBook Air, iPad mini, and iPhone 13 mini. He will fight to the death to keep a mini iPhone in the lineup. In his free time, Joe enjoys video games, movies, photography, running, and basically everything outdoors.
Thank you for signing up to iMore. You will receive a verification email shortly.
There was a problem. Please refresh the page and try again.