Yesterday Apple released the newest update of iOS 11, iOS 11.3.1.

At just over 49 megabytes the minor update includes a major fix for iPhone 8 users who’s iPhones were left without touchscreen functionality due to aftermarket or third party screen replacement. This issue was caused by a bug found in iOS 11.3 which curiously enough only affected the iPhone 8 and aftermarket screen replacements, fortunately the issue has been resolved with the latest update.

Patch notes found in the update description show a distinct warning against going through third-partly repair systems, the exact reference stated to stay away from “non-genuine replacement displays.”

The main reason apple included this in the patch notes is a fairly simple reason, they value the ability to provide a smooth experience relying on genuine hardware, the use of third party displays could affect the users experience depending on compatibility and touch sensitivity. Apple made use of the patch notes to stress on the fact that they will not support screen or hardware issues if the user has decided to replace their screen with a “non-genuine replacement display”.

These are the exact patch notes found in the description of the iOS 11.3.1 update;

 

“iOS 11.3.1 improves the security of your iPhone or iPad and addresses an issue where touch input was unresponsive on some iPhone 8 devices because they were serviced with non-genuine replacement displays.

Note: Non-genuine replacement displays may have compromised visual quality and may fail to work correctly. Apple-certified screen repairs are performed by trusted experts who use genuine Apple parts. See support.apple.com for more information.

 

For information on the security content of Apple software updates, please visit this website: https://support.apple.com/kb/HT201222

 

Alongside the iOS Update, Apple released macOS High Sierra 10.13.4 which included no added features or functionality updates, but focuses on two highly noticeable security vulnerabilities, the update notes for macOS High Sierra 10.13.4 can be found below;

 

“Crash Reporter

Available for: macOS High Sierra 10.13.4

 Impact: An application may be able to gain elevated privileges

 Description: A memory corruption issue was addressed with improved error handling.

 CVE-2018-4206: Ian Beer of Google Project Zero

 

LinkPresentation

 Available for: macOS High Sierra 10.13.4

 Impact: Processing a maliciously crafted text message may lead to UI spoofing

 Description: A spoofing issue existed in the handling of URLs. This issue was addressed with improved input validation.

 CVE-2018-4187: Zhiyang Zeng (@Wester) of Tencent Security Platform Department, Roman Mueller (@faker_) “

 

This was Eddie Vann from TeamAppleNews, keeping you up to date on the latest Apple News and Rumors.