CabConModding
Facebook
Twitter
youtube
Discord
Contact us
RSS
Menu
CabConModding
Home
New
Top
Premium
Rules
FAQ - Frequently Asked Questions
Games
Fornite
Call of Duty: Black Ops 3
Clash of Clans
Grand Theft Auto 5
Apex Legends
Assassin’s Creed Origins
Forums
Premium
Latest posts
What's new
Latest posts
New profile posts
Latest activity
Members
Current visitors
New profile posts
Log in
Register
What's new
Premium
Latest posts
Menu
Log in
Register
Navigation
Install the app
Install
More options
Dark Theme
Contact us
Close Menu
Forums
Mobile Section
Apple iOS
IOS 10.3.2 Release
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Reply to thread
Message
<blockquote data-quote="Lucifer" data-source="post: 22166" data-attributes="member: 431"><p>Hello CCM members</p><p></p><p>As of yesterday Apple Released 10.3.2 publicly here is what Apple fixed with iOS 10.3.2 [SPOILER=Fixes]</p><p><span style="font-size: 22px"><strong>About the security content of iOS 10.3.2</strong></span></p><p>This document describes the security content of iOS 10.3.2.</p><p></p><p></p><p><span style="font-size: 18px"><strong>About Apple security updates</strong></span></p><p>For our customers' protection, Apple doesn't disclose, discuss, or confirm security issues until an investigation has occurred and patches or releases are available. Recent releases are listed on the <a href="https://support.apple.com/kb/HT201222" target="_blank">Apple security updates</a> page.</p><p></p><p>For more information about security, see the <a href="https://support.apple.com/kb/HT201220" target="_blank">Apple Product Security</a> page. You can encrypt communications with Apple using the <a href="https://support.apple.com/kb/HT201601" target="_blank">Apple Product Security PGP Key</a>.</p><p></p><p>Apple security documents reference vulnerabilities by <a href="http://cve.mitre.org/about/" target="_blank">CVE-ID</a> when possible.</p><p></p><p><img src="https://support.apple.com/library/content/dam/edam/applecare/images/en_US/mac_apps/itunes/divider.png" alt="" class="fr-fic fr-dii fr-draggable " style="" /></p><p></p><p><span style="font-size: 18px"><strong>iOS 10.3.2</strong></span></p><p>Released May 15, 2017</p><p></p><p><strong>AVEVideoEncoder</strong></p><p></p><p>Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation</p><p></p><p>Impact: An application may be able to gain kernel privileges</p><p></p><p>Description: A memory corruption issue was addressed with improved memory handling.</p><p></p><p>CVE-2017-6989: Adam Donenfeld (@doadam) of the Zimperium zLabs Team</p><p></p><p><strong>CoreAudio</strong></p><p></p><p>Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation</p><p></p><p>Impact: An application may be able to read restricted memory</p><p></p><p>Description: A validation issue was addressed with improved input sanitization.</p><p></p><p>CVE-2017-2502: Yangkang (@dnpushme) of Qihoo360 Qex Team</p><p></p><p><strong>iBooks</strong></p><p></p><p>Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation</p><p></p><p>Impact: A maliciously crafted book may open arbitrary websites without user permission</p><p></p><p>Description: A URL handling issue was addressed through improved state management.</p><p></p><p>CVE-2017-2497: Jun Kokatsu (@shhnjk)</p><p></p><p><strong>iBooks</strong></p><p></p><p>Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation</p><p></p><p>Impact: An application may be able to execute arbitrary code with root privileges</p><p></p><p>Description: An issue existed within the path validation logic for symlinks. This issue was addressed through improved path sanitization.</p><p></p><p>CVE-2017-6981: evi1m0 of YSRC (sec.ly.com)</p><p></p><p><strong>IOSurface</strong></p><p></p><p>Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation</p><p></p><p>Impact: An application may be able to gain kernel privileges</p><p></p><p>Description: A memory corruption issue was addressed with improved memory handling.</p><p></p><p>CVE-2017-6979: Adam Donenfeld of Zimperium zLabs</p><p></p><p><strong>Kernel</strong></p><p></p><p>Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation</p><p></p><p>Impact: An application may be able to execute arbitrary code with kernel privileges</p><p></p><p>Description: A race condition was addressed through improved locking.</p><p></p><p>CVE-2017-2501: Ian Beer of Google Project Zero</p><p></p><p><strong>Kernel</strong></p><p></p><p>Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation</p><p></p><p>Impact: An application may be able to read restricted memory</p><p></p><p>Description: A validation issue was addressed with improved input sanitization.</p><p></p><p>CVE-2017-2507: Ian Beer of Google Project Zero</p><p></p><p>CVE-2017-6987: Patrick Wardle of Synack</p><p></p><p><strong>Notifications</strong></p><p></p><p>Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation</p><p></p><p>Impact: An application may be able to cause a denial of service</p><p></p><p>Description: A denial of service issue was addressed through improved memory handling.</p><p></p><p>CVE-2017-6982: Vincent Desmurs (vincedes3), Sem Voigtlander (OxFEEDFACE), and Joseph Shenton of CoffeeBreakers</p><p></p><p><strong>Safari</strong></p><p></p><p>Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation</p><p></p><p>Impact: Visiting a maliciously crafted webpage may lead to an application denial of service</p><p></p><p>Description: An issue in Safari's history menu was addressed through improved memory handling.</p><p></p><p>CVE-2017-2495: Tubasa Iinuma (@llamakko_cafe) of Gehirn Inc.</p><p></p><p><strong>Security</strong></p><p></p><p>Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation</p><p></p><p>Impact: Update to the certificate trust policy</p><p></p><p>Description: A certificate validation issue existed in the handling of untrusted certificates. This issue was addressed through improved user handling of trust acceptance.</p><p></p><p>CVE-2017-2498: Andrew Jerman</p><p></p><p><strong>SQLite</strong></p><p></p><p>Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation</p><p></p><p>Impact: A maliciously crafted SQL query may lead to arbitrary code execution</p><p></p><p>Description: A use after free issue was addressed through improved memory management.</p><p></p><p>CVE-2017-2513: found by OSS-Fuzz</p><p></p><p><strong>SQLite</strong></p><p></p><p>Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation</p><p></p><p>Impact: A maliciously crafted SQL query may lead to arbitrary code execution</p><p></p><p>Description: A buffer overflow issue was addressed through improved memory handling.</p><p></p><p>CVE-2017-2518: found by OSS-Fuzz</p><p></p><p>CVE-2017-2520: found by OSS-Fuzz</p><p></p><p><strong>SQLite</strong></p><p></p><p>Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation</p><p></p><p>Impact: A maliciously crafted SQL query may lead to arbitrary code execution</p><p></p><p>Description: A memory corruption issue was addressed with improved memory handling.</p><p></p><p>CVE-2017-2519: found by OSS-Fuzz</p><p></p><p><strong>SQLite</strong></p><p></p><p>Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation</p><p></p><p>Impact: Processing maliciously crafted web content may lead to arbitrary code execution</p><p></p><p>Description: Multiple memory corruption issues were addressed with improved input validation.</p><p></p><p>CVE-2017-6983: Chaitin Security Research Lab (@ChaitinTech) working with Trend Micro's Zero Day Initiative</p><p></p><p>CVE-2017-6991: Chaitin Security Research Lab (@ChaitinTech) working with Trend Micro's Zero Day Initiative</p><p></p><p><strong>TextInput</strong></p><p></p><p>Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation</p><p></p><p>Impact: Parsing maliciously crafted data may lead to arbitrary code execution</p><p></p><p>Description: A memory corruption issue was addressed with improved memory handling.</p><p></p><p>CVE-2017-2524: Ian Beer of Google Project Zero</p><p></p><p><strong>WebKit</strong></p><p></p><p>Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation</p><p></p><p>Impact: Processing maliciously crafted web content may lead to arbitrary code execution</p><p></p><p>Description: Multiple memory corruption issues were addressed with improved memory handling.</p><p></p><p>CVE-2017-2496: Apple</p><p></p><p>CVE-2017-2505: lokihardt of Google Project Zero</p><p></p><p>CVE-2017-2506: Zheng Huang of the Baidu Security Lab working with Trend Micro’s Zero Day Initiative</p><p></p><p>CVE-2017-2514: lokihardt of Google Project Zero</p><p></p><p>CVE-2017-2515: lokihardt of Google Project Zero</p><p></p><p>CVE-2017-2521: lokihardt of Google Project Zero</p><p></p><p>CVE-2017-2525: Kai Kang (4B5F5F4B) of Tencent’s Xuanwu Lab (tencent.com) working with Trend Micro’s Zero Day Initiative</p><p></p><p>CVE-2017-2526: Kai Kang (4B5F5F4B) of Tencent’s Xuanwu Lab (tencent.com) working with Trend Micro’s Zero Day Initiative</p><p></p><p>CVE-2017-2530: an anonymous researcher</p><p></p><p>CVE-2017-2531: lokihardt of Google Project Zero</p><p></p><p>CVE-2017-2538: Richard Zhu (fluorescence) working with Trend Micro's Zero Day Initiative</p><p></p><p>CVE-2017-2539: Richard Zhu (fluorescence) working with Trend Micro's Zero Day Initiative</p><p></p><p>CVE-2017-2544: 360 Security (@mj0011sec) working with Trend Micro's Zero Day Initiative</p><p></p><p>CVE-2017-2547: lokihardt of Google Project Zero, Team Sniper (Keen Lab and PC Mgr) working with Trend Micro's Zero Day Initiative</p><p></p><p>CVE-2017-6980: lokihardt of Google Project Zero</p><p></p><p>CVE-2017-6984: lokihardt of Google Project Zero</p><p></p><p><strong>WebKit</strong></p><p></p><p>Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation</p><p></p><p>Impact: Processing maliciously crafted web content may lead to universal cross site scripting</p><p></p><p>Description: A logic issue existed in the handling of WebKit Editor commands. This issue was addressed with improved state management.</p><p></p><p>CVE-2017-2504: lokihardt of Google Project Zero</p><p></p><p><strong>WebKit</strong></p><p></p><p>Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation</p><p></p><p>Impact: Processing maliciously crafted web content may lead to universal cross site scripting</p><p></p><p>Description: A logic issue existed in the handling of WebKit container nodes. This issue was addressed with improved state management.</p><p></p><p>CVE-2017-2508: lokihardt of Google Project Zero</p><p></p><p><strong>WebKit</strong></p><p></p><p>Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation</p><p></p><p>Impact: Processing maliciously crafted web content may lead to universal cross site scripting</p><p></p><p>Description: A logic issue existed in the handling of pageshow events. This issue was addressed with improved state management.</p><p></p><p>CVE-2017-2510: lokihardt of Google Project Zero</p><p></p><p><strong>WebKit</strong></p><p></p><p>Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation</p><p></p><p>Impact: Processing maliciously crafted web content may lead to universal cross site scripting</p><p></p><p>Description: A logic issue existed in the handling of WebKit cached frames. This issue was addressed with improved state management.</p><p></p><p>CVE-2017-2528: lokihardt of Google Project Zero</p><p></p><p><strong>WebKit</strong></p><p></p><p>Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation</p><p></p><p>Impact: Processing maliciously crafted web content may lead to arbitrary code execution</p><p></p><p>Description: Multiple memory corruption issues with addressed through improved memory handling.</p><p></p><p>CVE-2017-2536: Samuel Groß and Niklas Baumstark working with Trend Micro's Zero Day Initiative</p><p></p><p><strong>WebKit</strong></p><p></p><p>Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation</p><p></p><p>Impact: Processing maliciously crafted web content may lead to universal cross site scripting</p><p></p><p>Description: A logic issue existed in frame loading. This issue was addressed with improved state management.</p><p></p><p>CVE-2017-2549: lokihardt of Google Project Zero</p><p></p><p><strong>WebKit Web Inspector</strong></p><p></p><p>Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation</p><p></p><p>Impact: An application may be able to execute unsigned code</p><p></p><p>Description: A memory corruption issue was addressed with improved memory handling.</p><p></p><p>CVE-2017-2499: George Dan (@theninjaprawn) [/SPOILER]</p><p></p><p>Now if you look closely you will see Apple gave no credit to pangu for any bug fixes so that shows that pangu is not working with Apple.</p><p></p><p>This is a good thing that pangu is not working with Apple, but that does not mean pangu will release the jailbreak. One big issue that we see with this new iOS update is the kernel bug fixes if you guys remember back on 10.2 that is how the the 10.2 jailbreak came into play because of a kernel exploit.</p><p></p><p>Once pangu releases their jailbreak if they do I will be sure to let you guys know <img src="/styles/default/xenforo/smilies.emoji/people/slight_smile.emoji.svg" class="smilie" loading="lazy" alt=":smile:" title="Smile :smile:" data-shortname=":smile:" /></p><p></p><p>Have a nice day everyone <img src="/styles/default/xenforo/smilies.emoji/people/kissing_heart.emoji.svg" class="smilie" loading="lazy" alt=":kissingheart:" title="Kissing Heart :kissingheart:" data-shortname=":kissingheart:" /></p></blockquote><p></p>
[QUOTE="Lucifer, post: 22166, member: 431"] Hello CCM members As of yesterday Apple Released 10.3.2 publicly here is what Apple fixed with iOS 10.3.2 [SPOILER=Fixes] [SIZE=6][B]About the security content of iOS 10.3.2[/B][/SIZE] This document describes the security content of iOS 10.3.2. [SIZE=5][B]About Apple security updates[/B][/SIZE] For our customers' protection, Apple doesn't disclose, discuss, or confirm security issues until an investigation has occurred and patches or releases are available. Recent releases are listed on the [URL='https://support.apple.com/kb/HT201222']Apple security updates[/URL] page. For more information about security, see the [URL='https://support.apple.com/kb/HT201220']Apple Product Security[/URL] page. You can encrypt communications with Apple using the [URL='https://support.apple.com/kb/HT201601']Apple Product Security PGP Key[/URL]. Apple security documents reference vulnerabilities by [URL='http://cve.mitre.org/about/']CVE-ID[/URL] when possible. [IMG]https://support.apple.com/library/content/dam/edam/applecare/images/en_US/mac_apps/itunes/divider.png[/IMG] [SIZE=5][B]iOS 10.3.2[/B][/SIZE] Released May 15, 2017 [B]AVEVideoEncoder[/B] Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation Impact: An application may be able to gain kernel privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-6989: Adam Donenfeld (@doadam) of the Zimperium zLabs Team [B]CoreAudio[/B] Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation Impact: An application may be able to read restricted memory Description: A validation issue was addressed with improved input sanitization. CVE-2017-2502: Yangkang (@dnpushme) of Qihoo360 Qex Team [B]iBooks[/B] Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation Impact: A maliciously crafted book may open arbitrary websites without user permission Description: A URL handling issue was addressed through improved state management. CVE-2017-2497: Jun Kokatsu (@shhnjk) [B]iBooks[/B] Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation Impact: An application may be able to execute arbitrary code with root privileges Description: An issue existed within the path validation logic for symlinks. This issue was addressed through improved path sanitization. CVE-2017-6981: evi1m0 of YSRC (sec.ly.com) [B]IOSurface[/B] Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation Impact: An application may be able to gain kernel privileges Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-6979: Adam Donenfeld of Zimperium zLabs [B]Kernel[/B] Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation Impact: An application may be able to execute arbitrary code with kernel privileges Description: A race condition was addressed through improved locking. CVE-2017-2501: Ian Beer of Google Project Zero [B]Kernel[/B] Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation Impact: An application may be able to read restricted memory Description: A validation issue was addressed with improved input sanitization. CVE-2017-2507: Ian Beer of Google Project Zero CVE-2017-6987: Patrick Wardle of Synack [B]Notifications[/B] Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation Impact: An application may be able to cause a denial of service Description: A denial of service issue was addressed through improved memory handling. CVE-2017-6982: Vincent Desmurs (vincedes3), Sem Voigtlander (OxFEEDFACE), and Joseph Shenton of CoffeeBreakers [B]Safari[/B] Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation Impact: Visiting a maliciously crafted webpage may lead to an application denial of service Description: An issue in Safari's history menu was addressed through improved memory handling. CVE-2017-2495: Tubasa Iinuma (@llamakko_cafe) of Gehirn Inc. [B]Security[/B] Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation Impact: Update to the certificate trust policy Description: A certificate validation issue existed in the handling of untrusted certificates. This issue was addressed through improved user handling of trust acceptance. CVE-2017-2498: Andrew Jerman [B]SQLite[/B] Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation Impact: A maliciously crafted SQL query may lead to arbitrary code execution Description: A use after free issue was addressed through improved memory management. CVE-2017-2513: found by OSS-Fuzz [B]SQLite[/B] Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation Impact: A maliciously crafted SQL query may lead to arbitrary code execution Description: A buffer overflow issue was addressed through improved memory handling. CVE-2017-2518: found by OSS-Fuzz CVE-2017-2520: found by OSS-Fuzz [B]SQLite[/B] Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation Impact: A maliciously crafted SQL query may lead to arbitrary code execution Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-2519: found by OSS-Fuzz [B]SQLite[/B] Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: Multiple memory corruption issues were addressed with improved input validation. CVE-2017-6983: Chaitin Security Research Lab (@ChaitinTech) working with Trend Micro's Zero Day Initiative CVE-2017-6991: Chaitin Security Research Lab (@ChaitinTech) working with Trend Micro's Zero Day Initiative [B]TextInput[/B] Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation Impact: Parsing maliciously crafted data may lead to arbitrary code execution Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-2524: Ian Beer of Google Project Zero [B]WebKit[/B] Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: Multiple memory corruption issues were addressed with improved memory handling. CVE-2017-2496: Apple CVE-2017-2505: lokihardt of Google Project Zero CVE-2017-2506: Zheng Huang of the Baidu Security Lab working with Trend Micro’s Zero Day Initiative CVE-2017-2514: lokihardt of Google Project Zero CVE-2017-2515: lokihardt of Google Project Zero CVE-2017-2521: lokihardt of Google Project Zero CVE-2017-2525: Kai Kang (4B5F5F4B) of Tencent’s Xuanwu Lab (tencent.com) working with Trend Micro’s Zero Day Initiative CVE-2017-2526: Kai Kang (4B5F5F4B) of Tencent’s Xuanwu Lab (tencent.com) working with Trend Micro’s Zero Day Initiative CVE-2017-2530: an anonymous researcher CVE-2017-2531: lokihardt of Google Project Zero CVE-2017-2538: Richard Zhu (fluorescence) working with Trend Micro's Zero Day Initiative CVE-2017-2539: Richard Zhu (fluorescence) working with Trend Micro's Zero Day Initiative CVE-2017-2544: 360 Security (@mj0011sec) working with Trend Micro's Zero Day Initiative CVE-2017-2547: lokihardt of Google Project Zero, Team Sniper (Keen Lab and PC Mgr) working with Trend Micro's Zero Day Initiative CVE-2017-6980: lokihardt of Google Project Zero CVE-2017-6984: lokihardt of Google Project Zero [B]WebKit[/B] Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation Impact: Processing maliciously crafted web content may lead to universal cross site scripting Description: A logic issue existed in the handling of WebKit Editor commands. This issue was addressed with improved state management. CVE-2017-2504: lokihardt of Google Project Zero [B]WebKit[/B] Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation Impact: Processing maliciously crafted web content may lead to universal cross site scripting Description: A logic issue existed in the handling of WebKit container nodes. This issue was addressed with improved state management. CVE-2017-2508: lokihardt of Google Project Zero [B]WebKit[/B] Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation Impact: Processing maliciously crafted web content may lead to universal cross site scripting Description: A logic issue existed in the handling of pageshow events. This issue was addressed with improved state management. CVE-2017-2510: lokihardt of Google Project Zero [B]WebKit[/B] Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation Impact: Processing maliciously crafted web content may lead to universal cross site scripting Description: A logic issue existed in the handling of WebKit cached frames. This issue was addressed with improved state management. CVE-2017-2528: lokihardt of Google Project Zero [B]WebKit[/B] Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation Impact: Processing maliciously crafted web content may lead to arbitrary code execution Description: Multiple memory corruption issues with addressed through improved memory handling. CVE-2017-2536: Samuel Groß and Niklas Baumstark working with Trend Micro's Zero Day Initiative [B]WebKit[/B] Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation Impact: Processing maliciously crafted web content may lead to universal cross site scripting Description: A logic issue existed in frame loading. This issue was addressed with improved state management. CVE-2017-2549: lokihardt of Google Project Zero [B]WebKit Web Inspector[/B] Available for: iPhone 5 and later, iPad 4th generation and later, and iPod touch 6th generation Impact: An application may be able to execute unsigned code Description: A memory corruption issue was addressed with improved memory handling. CVE-2017-2499: George Dan (@theninjaprawn) [/SPOILER] Now if you look closely you will see Apple gave no credit to pangu for any bug fixes so that shows that pangu is not working with Apple. This is a good thing that pangu is not working with Apple, but that does not mean pangu will release the jailbreak. One big issue that we see with this new iOS update is the kernel bug fixes if you guys remember back on 10.2 that is how the the 10.2 jailbreak came into play because of a kernel exploit. Once pangu releases their jailbreak if they do I will be sure to let you guys know :smile: Have a nice day everyone :kissingheart: [/QUOTE]
Verification
Post reply
Forums
Mobile Section
Apple iOS
IOS 10.3.2 Release
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.
Accept
Learn more…
Top