Apple fixes Pangu / TAIG jailbreak exploit with iOS 9

Want create site? Find Free WordPress Themes and plugins.


Apple released iOS  a  couple days ago, and today also published some of the security fixes that were included in the software update. One of these corrections was related to failure to allow an application to bypass the code signing, which possibly was used for the (pseudo) semi-jailbreak, with which you can install applications from Safari. The failure was present in the iPhone 4S and later, iPhone touch of fifth and sixth generation and all iPad since the iPad 2.

Pangu and confirmed that Apple had corrected one of the exploits in iOS 9 GM was launched last week and have not yet said anything about it, so the error could be corrected the same announcement the Chinese hackers team last week or it could be another exploit, forcing them to get down to work to find new vulnerabilities that allow to jailbreak iOS in September.


Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later

Impact: An application may be able to bypass code signing

Description: An issue existed with validation of the code signature of executables. This issue was addressed through improved bounds checking.


CVE-2015-5839 : @PanguTeam, TaiG Jailbreak Team

As you can see, at the end of information both teams appear and hackers is not the first time Apple gives credit to the team that has discovered a vulnerability. In early 2013, the team of hackers evad3rs, who has lost prominence since the arrival of the Chinese to the scene, was pleasantly surprised to find that appeared like the discoverers of bug fixes, which is the closest thing to a shout they will receive from Apple.

Anyway, and although Apple tape an exploit after another, there is no perfect system, so it’s just a matter of time to find more bugs in iOS 9 which allow untethered jailbreak to the iPhone, iPod or iPad.

Did you find apk for android? You can find new Free Android Games and apps.

Follow us on Twitter, subscribe to our Facebook Page, find us on LinkedIn, circle us on Google+