Apple stays classy about jailbreakers with iOS 8.1.3 patch notes

By

Even jailbreakers need to unjailbreak sometimes.
Photo: Redmond Pie
Photo: Redmond Pie

When Apple releases a major update like yesterday’s iOS 8.1.3, it’s usual for the company’s coders to fix (or, in other words, break) all known jailbreak exploits.

Not so surprisingly, the latest update is no different. It fixes several exploits that are necessary to run the iOS 8.1.2 jailbreak. But in a classy move, at least Apple gave a hat tip to the jailbreak team for calling their attention to the exploits.

As you might recall, Chinese jailbreaking team TaiG was responsible for the iOS 8.1.2 jailbreak.

Apple apparently took notice of their work, because on a support page for the new iOS 8.1.3, Cupertino calls out the TaiG Jailbreak Team by name for helping them fix the following bugs:

AppleFileConduit

Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later

Impact: A maliciously crafted afc command may allow access to protected parts of the filesystem

Description: A vulnerability existed in the symbolic linking mechanism of afc. This issue was addressed by adding additional path checks.

CVE-ID

CVE-2014-4480 : TaiG Jailbreak Team

dyld

Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later

Impact: A local user may be able to execute unsigned code

Description: A state management issue existed in the handling of Mach-O executable files with overlapping segments. This issue was addressed through improved validation of segment sizes.

CVE-ID

CVE-2014-4455 : TaiG Jailbreak Team

IOHIDFamily

Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later

Impact: A malicious application may be able to execute arbitrary code with system privileges

Description: A buffer overflow existed in IOHIDFamily. This issue was addressed through improved size validation.

CVE-ID

CVE-2014-4487 : TaiG Jailbreak Team

Kernel

Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later

Impact: Maliciously crafted or compromised iOS applications may be able to determine addresses in the kernel

Description: The mach_port_kobject kernel interface leaked kernel addresses and heap permutation value, which may aid in bypassing address space layout randomization protection. This was addressed by disabling the mach_port_kobject interface in production configurations.

CVE-ID

CVE-2014-4496 : TaiG Jailbreak Team

With these exploits fixed, it’s only a matter of time before TaiG (or other teams) find new exploits to jailbreak. My guess is when Apple fixes those, they’ll be classy enough to credit the jailbreakers too.

Source: Apple
Via: iDownloadBlog

Newsletters

Daily round-ups or a weekly refresher, straight from Cult of Mac to your inbox.

  • The Weekender

    The week's best Apple news, reviews and how-tos from Cult of Mac, every Saturday morning. Our readers say: "Thank you guys for always posting cool stuff" -- Vaughn Nevins. "Very informative" -- Kenly Xavier.