From 319b5ad6a8b2305046a0646a91c63e58a08932f5 Mon Sep 17 00:00:00 2001 From: Man Yue Mo Date: Wed, 24 May 2023 10:40:12 +0100 Subject: [PATCH] Add link --- SecurityExploits/Android/Mali/CVE_2022_46395/README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/SecurityExploits/Android/Mali/CVE_2022_46395/README.md b/SecurityExploits/Android/Mali/CVE_2022_46395/README.md index 6cafc1a..c16225f 100644 --- a/SecurityExploits/Android/Mali/CVE_2022_46395/README.md +++ b/SecurityExploits/Android/Mali/CVE_2022_46395/README.md @@ -1,6 +1,6 @@ ## Exploit for CVE-2022-46395 -The write up can be found [here](). This is a bug in the Arm Mali kernel driver that I reported in November 2022. The bug can be used to gain arbitrary kernel code execution from the untrusted app domain, which is then used to disable SELinux and gain root. +The write up can be found [here](https://github.blog/2023-05-25-rooting-with-root-cause-finding-a-variant-of-a-project-zero-bug). This is a bug in the Arm Mali kernel driver that I reported in November 2022. The bug can be used to gain arbitrary kernel code execution from the untrusted app domain, which is then used to disable SELinux and gain root. The exploit is tested on the Google Pixel 6 with the Novmember 2022 and January 2023 patch. For reference, I used the following command to compile with clang in ndk-21: