Here is some not so great news for jailbreakers about iOS 9 kernel vulnerability. As you know few weeks back, at the HackPwn2015 security conference Pangu team had demonstrated an jailbroken iOS 8.4.1 iPhone 6. At that time it was beta release that should be followed by public launch.
It was thought that The Chinese team didn't release their iOS 8.4.1 jailbreak to public eye as it wanted to save kernel exploits for iOS 9 jailbreak.
However Pangu team has just published a post on their official blog titled ‘iOS 8.4.1 Kernel Vulnerabilities in AppleHDQGasGaugeControl’, in which they provide details about kernel vulnerabilities in iOS 8.4.1.
Windknown, one of Pangu Team member, wrote that when auditing iOS kernel executable, they have found that the code quality of com.apple.driver.AppleHDQGasGaugeControl was non-effective.
In the post he then goes on to provide more details about the three iOS 8.4.1 kernel vulnerabilities. Windknown also states that Apple has patched two out of the three vulnerabilities in iOS 9 beta 5. While he hasn’t explicitly mentioned it, it means that the jailbreak they had demonstrated for iOS 8.4.1, won’t work with iOS 9 because of hacked kernel exploits.
Pangu posted a enlightening report that’s fairly easy for understanding even if you’re not a experienced hacker or programmer. Windknown does a great job of explaining the particulars of each of the three vulnerabilities.
Apple is widely expected to release iOS 9 GM (Golden Master) to developers immediately after Apple media event 2015, followed by the release to the public next week.
Now that Pangu team has revealed the details about iOS 8.4.1- iOS 9 kernel vulnerabilities, it remains to be seen if they will push a jailbreak for iOS 8.4.1 to folks.
As it is few days for the iOS 9 release, this type of research indicates that hackers are still very much engaged in the different security research needed to accomplish a future jailbreak down the line. And we are excited to see how things go once iOS 9 is launched to the public.
[via Pangu Blog]