Not the first time Apple patches a security hole in iOS and then credits a jailbreak team for discovering the loop hole in the place for such exploition, but that’s exactly what seems to have happened. With the public release of iOS 9, Apple has also posted a knowledge base document that outlines the security fixes that went into the software. One of those, plugs a hole that allowed applications to bypass code signing, effectively allowing jailkbreak apps to function.
According to the document. Credits for the finding goes to Pangu and TaiG jailbreak teams from China. But wait, it;s not clear as though whether this is the same vulnerability in iOS 8.4.1 which Pangu confirmed last week to have been patched in iOS 9 GM version, or a different one.
Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later
Impact: An application may be able to bypass code signing
Description: An issue existed with validation of the code signature of executables. This issue was addressed through improved bounds checking.
CVE-2015-5839 : @PanguTeam, TaiG Jailbreak Team
Apple’s patching of exploits and vulnerabilities is nothing new, especially when they result in a popular jailbreak being made available. While it’s shame patching of yet another hole that could have beenb used for jailbreaking, as we’ve already seen at least one prominent hacker iH8sn0w – found a way to jailbreak iOS 9. Now that, whether or not he will ever release it for public is another story altogether.
Apple has although closed a ton of jailbreak/Cydia related exploits in iOS 8.4.1 which was released last month, and today it’s another, finally.
Those who jailbreak may enjoy their tweaks and play with. Security is one of Apple’s biggest claims for iOS, and obviously, in the world where Android can be all too easily thretened by malware, iOS has so far done well to steer clear of such problems. For that Apple is really taking its iOS to a new direction with malware-free OS.