Difference between revisions of "Corona"

From The iPhone Wiki
Jump to: navigation, search
m (changed saffron -> comex)
m (not a stub, wrong category, move the two exploits to own page)
Line 1: Line 1:
 
[[File:Corona.png|thumb|right|The details page for Corona in Cydia.]]
 
[[File:Corona.png|thumb|right|The details page for Corona in Cydia.]]
'''Corona''' is a [[Cydia.app|Cydia]] package from the [[Chronic Dev (team)|Chronic Dev Team]] on [[Saurik]]'s repo. It uses [[User:pod2g|pod2g]]'s [http://linux.die.net/man/8/racoon racoon] string format overflow exploit[https://twitter.com/i0n1c/status/151621970256076800] and an HFS heap overflow[https://twitter.com/i0n1c/status/151622687922458625][http://pod2g-ios.blogspot.com/2012/01/details-on-corona.html] to untether iOS 5.0.1 on previously-jailbroken devices. Alternatively, users can also re-run the [[iPhone Dev Team]]'s [[redsn0w]] 0.9.10 to untether their jailbreak with the same exploit. The name is an anagram of the aforementioned racoon software. 
+
'''Corona''' is a [[Cydia.app|Cydia]] package from the [[Chronic Dev (team)|Chronic Dev Team]] on [[Saurik]]'s repo. It uses [[User:pod2g|pod2g]]'s [[Racoon String Format Overflow Exploit]] and an [[HFS Heap Overflow]] to untether iOS 5.0.1 on previously-jailbroken devices. Alternatively, users can also re-run the [[iPhone Dev Team]]'s [[redsn0w]] 0.9.10 to untether their jailbreak with the same exploit. The name is an anagram of the aforementioned [http://linux.die.net/man/8/racoon racoon] software. 
   
 
==A5 Jailbreak==
 
==A5 Jailbreak==
Line 14: Line 14:
 
==External Links==
 
==External Links==
 
*[http://pod2g-ios.blogspot.com/2012/01/details-on-corona.html pod2g's details on the exploits]
 
*[http://pod2g-ios.blogspot.com/2012/01/details-on-corona.html pod2g's details on the exploits]
  +
[[Category:Hacking Software]]
{{stub|jailbreaking}}
 
[[Category:Exploits]]
 

Revision as of 10:18, 18 January 2012

The details page for Corona in Cydia.

Corona is a Cydia package from the Chronic Dev Team on Saurik's repo. It uses pod2g's Racoon String Format Overflow Exploit and an HFS Heap Overflow to untether iOS 5.0.1 on previously-jailbroken devices. Alternatively, users can also re-run the iPhone Dev Team's redsn0w 0.9.10 to untether their jailbreak with the same exploit. The name is an anagram of the aforementioned racoon software. 

A5 Jailbreak

According to pod2g's blog, he was having problems with the app sandboxing system used on the A5 processor in the iPad 2 and iPhone 4S, so he got planetbeing, MuscleNerd, Joshua Hill and saurik, dubbed the "dream team", to help to fix it[1][2]. Dustin Howett also demoed the A5 jailbreak on YouTube. A release date still hasn't been revealed, though.

Changelog

  • 1.0-5 was updated by Saurik again to require a reboot after installing. 
  • 1.0-4 includes sandbox patches by comex that fixes iBooks problems, as well as another fix for launchctl.[3]
  • 1.0-3 was updated by Saurik to enable redsn0w 0.9.10 users to update the jailbreak through Cydia.
  • 1.0-2 attempted to fix a bug that caused launchctl to not start daemons on-demand.
  • 1.0-1 is the initial release of the jailbreak.

External Links