Apple has rolled out a rapid response patch for iOS, iPadOS, and MacOS to fix a 0-day in WebKit that "may be actively exploited." Go patch your stuff.

https://support.apple.com/en-us/HT213823

About the security content of Rapid Security Responses for iOS 16.5.1 and iPadOS 16.5.1

This document describes the content of Rapid Security Responses.

Apple Support
@evacide THANKS for the heads-up.
@evacide There have been a lot of those lately. I’m glad they’re jumping on them quickly. The mild annoyance of having to update pales before the risk of leaving yourself vulnerable.
@evacide Unfortunately, no update (yet) available for the iOS 15 my iPod touch is running, and the information publicly released on the CVE is basically nothing besides the number and that it's actively exploited.
@evacide Thank you. Patching now.
@evacide got a weird WhatsApp call from a number I didn’t recognise. Didn’t pick up. Should I be worried. (Patch now applied).
@evacide AND Facebook.com is now broken. There's some irony, here.

A fix for a “may be actively exploited” bug means that some people had their devices, compromised, lost control of all their private convos, photos, everything, past and future, probably for the rest of their device’s lifetime if not their own. And no one will know if it was them. Was it you and your data? Who knows.

That’s the state of software engineering right now. CISA wants better. Consumer Reports wants better. Consumers should demand better. Better is possible.

@evacide It's such a shame that Apple's updates take a very long time and provide absolutely no reliable indication as to when they will be finished.

The last minor update I made took me over 30 minutes: trillions of operations. Copying a 3.5 gig file on this machine takes 2 seconds, so I could copy well over a terabyte in that time.

It showed me six progress dialogs, all lies.

Meanwhile I have a job to do.