Apple released iOS 9.1 today morning, only a week after the first public jailbreak for iOS 9 devices hit the web. From the looks of it, the latest iOS iteration seems to shut doors on two of the exploits used by the Chinese hacking team Pangu, whose untethered jailbreak allowed users to jailbreak nearly all iPhone, iPad and iPod touch devices running iOS versions 9.0 through 9.0.2. However, Apple has acknowledged the Pangu team for discovering two vulnerabilities in iOS operating system. In a security document posted on Apple’s website, the Cupertino giant credited Pangu with discovering two vulnerabilities. According to the web posting, both of the vulnerabilities have now been patched though it is unknown whether Pangu team will get any bug bounty for discovering them. These include one vulnerability that would allow a malicious application to elevate privileges, and another that would allow a malicious application to execute arbitrary code with kernel privileges. The Apple jailbreaking community was not surprised at the closing of the two exploits because the Pangu jailbreak tool did not work with beta build of iOS 9.1. In fact, the general consensus among the jailbreaking crowd is that Pangu pushed their jailbreak just ahead of the iOS 9.1 release so that it could reach the hands of iPhone/iPad owners before the exploits were patched. Meanwhile Pangu released a new build of their jailbreak tool (version 1.1.0) ahead of the 9.1 release by Apple this morning, Pangu said that the latest build was more stable and saw better results. The team has not said yet if it has a 9.1 hack in the works. If you want to jailbreak your Apple devices, it is suggested that you stay away for iOS 9.1 version till Pangu or other jailbreakers find new exploit on which they can build the next jailbreak tool. Do remember that the first malware to hit iPhones was spread through jailbroken phones.