0:00
what's going on youtube gsn right here
0:02
today i have great news for those of you
0:04
waiting for a jailbreak because ios 15.2
0:06
has been released and with that a lot of
0:09
patches to a lot of our abilities that
0:11
we can use including a lot of
0:12
vulnerabilities from pango team in fact
0:15
if you go ahead here on the security
0:16
content of ios 15.2 and ipad os 15.2
0:20
it's completely packed with a lot of
0:22
changes so you can see a lot of i o
0:24
mobile frame buffer vulnerabilities this
0:26
one from pangu another one from pangu
0:28
here another one again from pango here
0:30
google project zero on the kernel then
0:33
pango again then google project zero
0:35
ember of google project zero again
0:37
probably remember enbr has released a
0:39
lot of vulnerabilities for the ios
0:41
kernel before that we have used in
0:43
jailbreaks including in yalu and stuff
0:45
like that then again one from ned
0:47
williamson of google project zero and
0:49
conlon lab in there and many many other
0:51
so this update is completely packed with
0:54
kernel patches and i o mobile frame
0:56
buffer vulnerability patches and so on
0:58
so if you remember i talked about this
0:59
vulnerability a couple of times in my
1:01
videos by brighty app this one seemed to
1:03
be exactly what we needed for uncover
1:05
and touring to be updated it's a kernel
1:07
vulnerability which of course as
1:09
demonstrated here by brady app has read
1:11
and write privileges and even got the
1:13
kernel slide and this one was
1:14
demonstrated on 15.1 well today brya
1:17
posted after apple released the update
1:19
hello cve 2021 30955 so this means that
1:23
the vulnerability has been patched and
1:25
is this one in here in kernel a
1:27
malicious application may be able to
1:28
execute arbitrary code with kernel
1:30
privileges on conlon lab and we also got
1:33
a release date for this they said in
1:35
here quote according to our labs
1:37
regulations we will disclose all the
1:39
details in two months so in two months
1:42
we will have a complete kernel
1:44
vulnerability that will actually render
1:46
a jailbreak for ios 15.1 and lower so if
1:49
you go ahead in here now and see what is
1:50
currently signed anything will be
1:52
supported except fifteen point two so
1:55
fifteen point one fifteen point zero
1:56
point two fifteen point zero point one
1:58
fifteen point zero fourteen point eight
2:00
fourteen point seven fourteen point six
2:02
and so on all of these will be supported
2:04
in a jailbreak two months from now
2:06
because this will be released and this
2:08
one was a very powerful vulnerability as
2:11
i mentioned in my other videos and i
2:12
said at that point that if this gets
2:14
released we can update uncover and
2:16
taurine to work with it and that's still
2:18
holding true this vulnerability alone
2:20
once released will be massive it will
2:23
basically close the gap between ios
2:25
14.5.1 which is currently jailbroken
2:27
with uncover and 15.1 which has no
2:30
jailbreak right now so whatever you do
2:32
absolutely whatever you do do not update
2:35
the 15.2 is the worst mistake you can do
2:38
if your device already has updated you
2:40
can still downgrade the 15.1 it's still
2:42
signed you can see here on my website
2:44
it's still signed but it's probably not
2:46
going to stay so for too long so
2:48
definitely downgrade as fast as possible
2:50
and remember that's only one
2:52
vulnerability only this vulnerability
2:53
here is enough to update uncover in
2:56
taurine for 15.1 and lower so basically
2:59
for all ios versions we've been waiting
3:01
for for a couple of months but there are
3:02
multiple other kernel vulnerabilities in
3:04
here some of them from google project
3:06
zero some of them from pangu and of
3:08
course many many other vulnerabilities
3:10
that are not in the kernel but still
3:11
have kernel privileges like i o mobile
3:13
frame buffer here which is by pangu and
3:15
this means that we don't have to
3:16
necessarily wait for two months before
3:18
we get an exploit any of this could drop
3:20
at any time and it could be useful and
3:22
it has been the case in the past that
3:24
people have differed the vulnerability
3:26
so how that works well you would get the
3:28
kernel for example from ios 15.1 and the
3:31
kernel from 15.2 for the same device and
3:34
this it in order to see what are the
3:36
changes and of course when you find the
3:37
change from one version to another it
3:39
means that there is the vulnerability
3:41
it's just a matter of time to find out
3:43
what exactly the vulnerability is so
3:44
there is a chance we might get those
3:46
vulnerabilities earlier if somebody is
3:48
curious enough but even if we don't we
3:50
know for sure that bridey app will
3:52
release in two months for all those
3:54
versions yes i know two months a lot of
3:56
time to wait but once that gets released
3:58
it will cover everything we have in here
4:00
except 15.2 which was released today so
4:02
definitely incredible news for the
4:04
jailbreak community don't forget you can
4:05
support this channel if you wanted to
4:07
keep going on patreon the link will be
4:09
down below or of course you can give it
4:10
a like or subscribe to the channel it
4:12
helps a lot thank you for watching
4:14
ingest now till the next time peace out