Apple has listed several security patches in the security release notes of iOS 9.1 and has credited the “Pangu Team” for discovering two of them. Here are the vulnerabilities that have been patched in iOS 9.1 that were most probably used in the Pangu iOS 9 – iOS 9.0.2 jailbreak.
This means that Pangu Jailbreak won’t work with iOS 9.1. You can still use them to jailbreak your device on iOS 9.0.2, iOS 9.0.1 and iOS 9.configd
Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later
Impact: A malicious application may be able to elevate privileges
Description: A heap based buffer overflow issue existed in the DNS client library. A malicious application with the ability to spoof responses from the local configd service may have been able to cause arbitrary code execution in DNS clients.
CVE-ID
CVE-2015-7015 : PanguTeam
GasGauge
Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later
Impact: A malicious application may be able to execute arbitrary code with kernel privileges
Description: A memory corruption issue existed in the kernel. This issue was addressed through improved memory handling.
CVE-ID
CVE-2015-6979 : PanguTeam
It is not clear if Apple had already patched the vulnerabilities in iOS 9.1 beta version, or they discovered them after Pangu iOS 9 jailbreak was released last week.
It goes without saying that jailbreakers should avoid upgrading to iOS 9,1 and be extremely careful while installing jailbreak tweaks.
We’ll let you know as soon as we’ve any further updates. So don’t forget to join our Facebook Fan page, follow us on Twitter, add us to your circles on Google+, subscribe to our RSS feed, our Daily Newsletter or subscribe to our all-new push notifications on your Mac in Safari for the latest updates on the iOS 9.1 jailbreak