The iPhone Wiki is no longer updated. Visit this article on The Apple Wiki for current information. |
Difference between revisions of "P0sixspwn"
m (use OS X as that's how Apple markets it (just like how we don't use iPod Touch because Apple markets it as iPod touch)) |
(OK, I /swear/ I'm done) |
||
Line 30: | Line 30: | ||
| [https://mega.co.nz/#!l8lniKxL!ODQrFDGbOUpm2hvU-mQggm25IgNk3_TmSO1r7tlU178 Mega] |
| [https://mega.co.nz/#!l8lniKxL!ODQrFDGbOUpm2hvU-mQggm25IgNk3_TmSO1r7tlU178 Mega] |
||
| |
| |
||
− | * Resolves issues with iPod touch 5 not being detected. |
+ | * Resolves issues with [[iPod touch 5]] not being detected. |
|- |
|- |
||
! 1.0.2 |
! 1.0.2 |
Revision as of 21:33, 3 January 2014
p0sixspwn is an untethered jailbreak for iOS 6.1.3-6.1.5 by winocm, iH8sn0w and SquiffyPwn. It was initially made available as an Cydia package on Saurik's repo to untether already jailbroken devices. It works with all devices that support iOS 6.1.3-6.1.5, except for Apple TV 3. On 30 December 2013, a Mac OS X program was released to perform a jailbreak. A Windows program was released on 3 January 2014.
Cydia Package Changelog
- 1.0-5 the initial release of the untether
- 1.0-9 iPhone 4 GSM boot loop fix
- 1.1-1 Automatically reboot after 30 seconds if device did not boot. (iH8sn0w's repo only)
- 1.1-2 Automatically reboot after one minute if device did not boot due to 30 seconds was too quick. (iH8sn0w's repo only)
- 1.1-3 Automatically reboot after two minutes if device did not boot due to 60 seconds was too quick. (iH8sn0w's repo only)
- 1.2-1 Various bug fixes.
- 1.3-2 Fixes iMessage, LTE issues and Apple TV 2G support.
Desktop Download
Version | OS | SHA-1 Hash | Download | Changes |
---|---|---|---|---|
1.0.0 | OS X | b5a66f4e58ab4c813fc851d479b28188eb5115ec
|
Mega |
|
1.0.1 | ae5b3907660b161b2ff94a2e2cfef97195404a89
|
Mega |
| |
1.0.2 | 259e95fd16468260c8831ca17186f50b7d14ba41
|
Mega |
| |
1.0.3 | Windows | 060c95cda0e5ad861bd225ca19324e6ebd3c0a5d
|
Mega |
|
1.0.4 | 0a40a9780ba0dd9f0476d12950b4fb0026c8559a
|
Mega |
|
Exploits
- posix_spawn kernel information leak (by i0n1c)
- mach_msg_ool_descriptor_ts for heap shaping
- dyld S_ATTR_LOC_RELOC/function reexport (also used in evasi0n7) (same as AMFID_code_signing_evasion?)
- DeveloperDiskImage race condition (by comex)
- MobileBackup2 arbitrary symbolic link restore (also used in evasi0n) (same as Symbolic Link Vulnerability?, fixed in iOS7.1b2)
- launchd.conf (same as launchd.conf untether?)