Google Project Zero affiliated security researcher Ian Beer has published a write-up describing a kernel-level exploit that has been patched in iOS 15.2.
While proof of concept (PoC) in the write-up is based on macOS, the exploit that Apple patched in CVE-2021-30949 also applies to iOS and iPadOS versions prior to 15.2.
The exploit in question, which has been fixed by Apple in iOS 15.2 or later could allow a malicious app to execute arbitrary code with kernel privileges. For those of you who are familiar with past jailbreak development, it would sound very familiar, as having the ability to execute arbitrary code with kernel privileges is an essential component of an iOS jailbreak.
Since there is no jailbreak available for iOS 15 even months after its initial release, the jailbreak community is in great need of exploits that could be used to create an iOS 15 jailbreak. The CVE-2021-30949 exploit that Beer has featured in his write-up appears to have that potential.
It remains to be seen if any jailbreak team that includes teams behind unc0ver and Taurine pick up on this exploit and put in effort to turn it into a public jailbreak.
If you are someone who is looking for a chance to jailbreak his or her iPhone or iPad, then it is advisable to stay on the lowest possible version of iOS.
Even if the exploit Ian Beer has written about turns into a jailbreak it will only work with iOS 15.1.1 or lower, leaving those who are running iOS 15.2 or later out of the loop.