A couple of days ago, security specialist Russ Cox discovered a kernel level exploit for iOS 11.2-11.2.1 and raised
According to Apple's postscript for iOS 11.2 update.5, the bug is able to retrieve arbitrary device code. But, according to a specialist, this is just a memory corruption that does not carry such great significance.
Russ clarified the situation on Twitter. In addition, he wrote that his exploit still would not lead to the creation of a jailbreak.
* I do not have an exploit. I just informed Apple about the memory corruption. Perhaps the company discovered something that I did not find, and it really allows you to “extract the kernel code,” but I don’t know how. I don’t know how else you can say that you will be disappointed.
In the past, based on kernel level exploits more than oncejailbreak tools were created, so the initial focus on Cox's exploit is understandable. It is also unclear why Apple designated the memory bug as “a kernel-level bug with which you can extract arbitrary code,” since this turned out to be completely different.
This news will disappoint everyone who hoped for a jailbreak for iOS 11.2 - 11.2.1. On the other hand, new exploits are found all the time, and soon the situation can radically change.
Due to such circumstances, the exploit of YenBira "tfp0" remains the last used for jailbreak. Electra and LiberiOS tools are based on it, and in the future they may appear more after the Cydia update for iOS 11 is released.