dyld in Apple iOS before 8.1.1 and Apple TV before 7.0.2 does not properly handle overlapping segments in Mach-O executable files, which allows local users to bypass intended code-signing restrictions via a crafted file.
https://support.apple.com/en-us/HT6592
https://support.apple.com/en-us/HT6590
https://support.apple.com/en-us/HT204420
https://support.apple.com/en-us/HT204418
https://exchange.xforce.ibmcloud.com/vulnerabilities/98773
http://www.securitytracker.com/id/1031231
http://www.securityfocus.com/bid/71140
http://support.apple.com/HT204246
http://support.apple.com/HT204245
http://lists.apple.com/archives/security-announce/2015/Jan/msg00001.html
http://lists.apple.com/archives/security-announce/2015/Jan/msg00000.html
http://lists.apple.com/archives/security-announce/2014/Nov/msg00002.html
http://lists.apple.com/archives/security-announce/2014/Nov/msg00000.html