

The issue Beer found starts with Apple's Mach kernel implementation, and the Mach interface generator (MIG). The release is designed to let others take their own toolkits to Apple devices, ultimately to improve their security: if you don't need to jailbreak a device, Apple had already patched the bugs last week. Tfp0 should work for all devices, the PoC local kernel debugger only for those I have to test on (iPhone 7, 6s and iPod Touch 6G) but adding more support should be easy IOS 11.1.2, now with more kernel debugging: (For non-programmers: tfp0 stands for “task for pid 0” – the kernel task port, and therefore the vector for pwnage.) If you're interested in bootstrapping iOS 11 kernel security research keep a research-only device on iOS 11.1.2 or below.

He even launched a Twitter account for the occasion: Ian Beer of Google's Project Zero has followed up on a “coming soon” Twitter teaser with a jailbreakable iOS and Mac OS vulnerability.īeer went public after Apple worked out a fix for the kernel memory corruption bug.
