Security researcher Saar Amar on Monday published a proof of concept (PoC) of a kernel-level vulnerability dubbed CVE-2021-30883 that was patched by Apple’s iOS & iPadOS 15.0.2 software updates.
The write-up reignited hope that we’d see a jailbreak for recent iterations of Apple’s mobile operating systems, and perhaps unsurprisingly, some security researchers have already started going hands-on with it.
When Apple released iOS & iPadOS 15.0.2 on Monday, one of the major changes was a security patch for a vulnerability reported in IOMobileFrameBuffer in which memory corruption could have resulted in an app executing arbitrary code with kernel-level privileges.
Apple released iOS & iPadOS 15.0.1 on October 1st, marking the first update to the company’s new mobile operating systems with bug fixes. Notably, this update resolved a problem with Unlock with Apple Watch not working correctly with the brand-new iPhone 13 lineup – an exceptionally valuable feature amid a raging pandemic in which mask-wearing has become a common sight.
Now that some time has passed since Apple released iOS & iPadOS 15.0.1, it’s no surprise to see that Apple is closing the signing window for the original iOS & iPadOS 15.0 firmware that launched to the general public just two weeks prior.
A couple of Mondays ago, Apple officially released iOS & iPadOS 15 to the general public with a slew of new features for Apple’s mobile device lineup following an extensive beta period throughout the Summer months.
Perhaps unsurprisingly, Apple’s move to launch a new firmware version for its platforms has now been complemented with the unsigning of the previously current firmware — iOS & iPadOS 14.8.
The Chimera jailbreak tool for iOS 12 devices received a rare update late Thursday night to version 1.6.4.
In a somewhat unexpected move, Apple on Thursday released iOS 12.5.5, a small firmware update for older iPhones, iPads, and iPod touches that are incapable of running iOS or iPadOS 13 and later.
With iOS and iPadOS 15 now available to the general public, an assortment of questions and even rumors have started to circulate about jailbreaking.
Amid all the recent excitement surrounding jailbreak untether hype and the confirmation that one would be officially released on October 21st, there’s certainly a lot to look forward to. But for right now, it’s business as usual for jailbreak groups like the Odyssey Team.
If you’ve had your eyes glued to jailbreak community developments amid all the talk of untethers recently, then you’re not alone, and we’re especially excited to share that you’re in for some good news.
Apple released iOS & iPadOS 14.8 last Monday to patch serious vulnerabilities that could have been weaponized by hackers to run malicious code on others’ iPhones and iPads via iMessage. Most owners of these devices were advised to update without hesitation, except perhaps jailbreakers, given the gravity of what these vulnerabilities could have entailed.
Now that it’s been a week since that software update, it may come as no surprise that Apple has officially closed the signing window for iOS & iPadOS 14.7.1, the firmware that pre-dated iOS & iPadOS 14.8.
Excitement is swirling around in the jailbreak community Monday evening after hacker and iOS developer @__spv took to Twitter to share thought-provoking Tweets related to untethered jailbreaks.
Untethered jailbreaks are something of a rarity these days, with most modern jailbreaks being either semi-tethered or semi-untethered variants instead. But a teaser by security researcher Linus Henze just one week ago manifested at least some hope that the community could witness one again soon, at least for the likes of iOS & iPadOS 14.5.1 and below.
And speaking of untethered jailbreaks, Odyssey Team lead developer CoolStar announced via the Sileo / Taurine / Odyssey Discord channel Monday evening that they had successfully achieved arbitrary code execution in a native iOS/iPadOS application after conducting a full reboot of the device. This is, of course, the hallmark feature of an untethered jailbreak.