Pangu was able to jailbreak iOS 9.0 to 9.0.2; however, in Apple's document on the security content of iOS 9.1, PanguTeam is credited with discovering two vulnerabilities that have been patched.
----- configd ● Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later ● Impact: A malicious application may be able to elevate privileges ● Description: A heap based buffer overflow issue existed in the DNS client library. A malicious application with the ability to spoof responses from the local configd service may have been able to cause arbitrary code execution in DNS clients. ● CVE-2015-7015 : PanguTeam
GasGauge ● Available for: iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later ● Impact: A malicious application may be able to execute arbitrary code with kernel privileges ● Description: A memory corruption issue existed in the kernel. This issue was addressed through improved memory handling. ● CVE-2015-6979 : PanguTeam -----
Be careful not to update to iOS 9.1 if you want a jailbreak. The signing window for iOS 9.0.2 is still open so if you are on a lower firmware version it is still possible to install iOS 9.0.2 for a limited time.
Download 9.0.2 from iClarified- on iTunes Mac hold Option restore - search for the firmware on you computer and restore to that version, then Pangu that baby.
No one would know whether apple would have found it without pangu's help or not. I believe that's why they released it. It's either take the chance and get the jailbreak out before apple fixes it, or no jailbreak at all. If pangu didn't disclose the bug and release the jailbreak, apple's thousands of devs or someone would have probably found out before the release of iOS 9.1
Expect that everybody did know for sure, since it was patched in latest 9.1 beta. So it was already unjailbreakable.
Good point is that since we have working jailbreak for 9.0.2, by the time we get new JB most of the common tweaks will be optimized for iPhone6s and iOS 9.x.x
No, Apple responded so quickly because Pangu turned over the exploits to Apple in exchange for a reporting bonus Apple offers. Jailbreakers discover an exploit, proves it's valid to producing a new jailbreak, then Apple pays them for information on how to patch it so it won't work in the future. Pangu has done this a couple times. The other side of this are those who sell exploits to the law-enforcement community, which jailbreaks any phone in order to read locked email and messages. Such actions make the jailbreakers complicit in the very actions they're battling (locking computer systems so users can't customize their own products).
apple probably patched the exploit in one of the 9.1 betas, which is why the pangu team decided to release it for 9.0.2. This has happened many times in the past. They were probably holding onto the exploits for iOS 9.1 so it would be compatible with the iPad pro, but they saw that Apple patched it in a later version of the 9.1 betas and released it for 9.0.2. These guys aren't idiots you know......
Please. After all these years I'm sure Apple could easily block Cyrus from iOS permanently. So again. Cat and mouse. iOS release. Jailbreak. iOS patch release. Repeat. Cat and mouse.