Huge revelations in the jailbreaking scene today. I have reimplemented the DarkSword iOS <=26.0.1* kernel exploit that was somehow randomly posted on GitHub yesterday. Dopamine 15.8.7 support eta s0n 🤣 And maybe iOS 16 EOL support too!

*untested on anything above iOS 17 at the moment

@opa334 so being on 26.0 would work?

@Pixav @opa334

kexploit probably will, but a jailbreak wouldn't be possible (as 26.x is arm64e only for iOS/iPadOS, and arm64e needs a PPL/SPTM (depending on device) Bypass

best cases for a jailbreak now (assuming everything turns out as I optimistically understand it) would be:
- arm64 semi-untether up to 18.7.1 (including 15.x/16.x/17.x EoL)
- arm64e jailbreak up to 17.3.1 (using PPL/SPTM Bypasses from Coruna chain)

@MasterMike @opa334 I thought 17.2.1 was the highest for Coruna arm64e? Thank you for that explanation🙏

@Pixav @opa334

so the kexploit that the Coruna kit chain uses on later versions (Gruber) only supports up to 17.2.1 (patched in 17.3), that's the basis of where we were originally

*but*, the PPL/SPTM Bypasses were not patched until 17.4, so they presumably work up to 17.3.1

@MasterMike @Pixav @opa334 I do see Rocket being patched with iOS 17.5. Rocket should be a PPL bypass. What is the difference with that exploit? Seemingly only Sparrow seems to be mentioned here.

@justus61 @Pixav @opa334

So this is actually an error I didn't notice originally (though others initially didn't notice it either), but basically while Google says it was patched in 17.5, the CVE it associates with it was patched in 17.4...

While I suppose it could be that the associated CVE is wrong, more than likely it's probably Google listing the wrong version for some reason (there's other errors there too, though nothing like that that is relevant).

@MasterMike @Pixav @opa334 Unfortunate, but makes sense. So I guess this completed the confusion.