Apple ha corretto tutti gli exploit sfruttati da Pangu per eseguire il jailbreak di iOS 9 e successivi.
Ecco il changelog diramato da Apple in cui viene ringraziato il Pangu Team:
configd
● Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later
● Impact: A malicious application may be able to elevate privileges
● Description: A heap based buffer overflow issue existed in the DNS client library. A malicious application with the ability to spoof responses from the local configd service may have been able to cause arbitrary code execution in DNS clients.
● CVE-2015-7015 : PanguTeamGasGauge
● Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later
● Impact: A malicious application may be able to execute arbitrary code with kernel privileges
● Description: A memory corruption issue existed in the kernel. This issue was addressed through improved memory handling.
● CVE-2015-6979 : PanguTeam
A questo punto non possiamo che consigliarvi di restare ad iOS 9.0.2 o precedente se tenete al jailbreak, dato che per il momento non esiste e non è in sviluppo un jailbreak di iOS 9.1.