It’s now confirmed. The TaiG jailbreak for iOS 8.4, iOS 8.3, iOS 8.2 and iOS 8.1.3 has been patched by Apple in the latest iOS 8.4.1 release.
Apple has published a new support document highlighting the security content of iOS 8.4.1. According to this document, Apple has patched not one but eight exploits used in TaiG jailbreak. Apple has obviously credited the Chinese-based team TaiG for finding these exploits in iOS.
CVE-2015-5746 : evad3rs, TaiG Jailbreak Team
CVE-2015-5766 : TaiG Jailbreak Team
CVE-2015-5752 : TaiG Jailbreak Team
CVE-2015-3806 : TaiG Jailbreak Team
CVE-2015-3803 : TaiG Jailbreak Team
CVE-2015-3802 : TaiG Jailbreak Team
CVE-2015-3805 : TaiG Jailbreak Team
CVE-2015-5774 : TaiG Jailbreak Team
What this means is that unless and until TaiG or some other jailbreak team have exploits which are not known to Apple yet, the chances of yet another quick jailbreak tool for iOS 8.x looks slim. Also with iOS 9 releasing next month, jailbreak teams will likely save any more exploits they have for next major Apple release rather than wasting it on this minor 8.4.1 update.
If you’re on iOS 8.4 and care about jailbreaking, just stay there and DO NOT update to iOS 8.4.1. The next public jailbreak won’t be coming for many months now.
If you are on a version older than iOS 8.4, you can update to iOS 8.4 now as Apple is still signing the firmware. The signing window for 8.4 won’t last for long though so you might want to hurry if you want to restore to iOS 8.4.
You can get iOS 8.4 firmware file from here: Download iOS 8.4 Final IPSW Links For iPhone And iPad.
For more on jailbreak news, updates, tweaks and tutorials, stay tuned to our coverage here at RP.
(source: Apple)
You may also like to check out:
- iOS 8.4.1 Jailbreak Status Update
- Download iOS 8.4.1 Final For iPhone, iPad, iPod touch [IPSW Links]
- Jailbreak iOS 8.4 With TaiG / PP On iPhone 6, 6 Plus, 5s, More [Updated]
You can follow us on Twitter, add us to your circle on Google+ or like our Facebook page to keep yourself updated on all the latest from Microsoft, Google, Apple and the web.