dyld in Apple iOS before 8.1.1 and Apple TV before 7.0.2 does not properly handle overlapping segments in Mach-O executable files, which allows local users to bypass intended code-signing restrictions via a crafted file.Referenceshttp://lists.apple.com/archives/security-announce/2014/Nov/msg00000.htmlhttp://support.apple.com/HT204245http://lists.apple.com/archives/security-announce/2014/Nov/msg00002.htmlhttp://support.apple.com/HT204246https://support.apple.com/en-us/HT6590http://www.securitytracker.com/id/1031231http://lists.apple.com/archives/security-announce/2015/Jan/msg00001.htmlhttps://exchange.xforce.ibmcloud.com/vulnerabilities/98773http://lists.apple.com/archives/security-announce/2015/Jan/msg00000.htmlhttp://www.securityfocus.com/bid/71140https://support.apple.com/en-us/HT204420https://support.apple.com/en-us/HT204418https://support.apple.com/en-us/HT6592