CVE-2015-3636
CVE-2015-3636 copied to clipboard
PoC code for 32 bit Android OS
How compile it ?and how to use it "???
In arm32, when the POC shows "Dnoe!", the kernel went to panic. And the dmesg showed that "Unable to handle kernel paging request at virtual address 00200200", the pid pointed...
I have already kalllsyms.txt, and temp root, but this poc got failed, i want unlock miyabi and mmc
I have an issue where the code continues allocating memory and never stop and never moves past this step. Has anyone been able to resolve this? If so how?
Thnaks so much ro making the exploit open. THis has help me in my research alot. Howeve, i am facing an issue where there is an infite loop if sockets...
my phone 6.0.1 galaxy 5 32bit ./poc creating target socket...... ok 4194304 bytes allocated 4194304 bytes allocated 4194304 bytes allocated 4194304 bytes allocated 4194304 bytes allocated 4194304 bytes allocated 4194304...
yes, i try to root M1, but crash when closeing sockets. Thanks very much to anybody can give a hand to me~~~ "model": "m1", "versionCode": 13, "versionName": "v.13", "builddate": 1427535327000,...
In my device, When I run these PoC, the output is below: shell@android:/data/local/tmp $ ./poc Creating target socket...>>>> max_fds:4096 >>>> create_child pid:102784 pipe_read:3 num_socks_created:0 .socks[num_socks] == -1 errno: 13 OK...
Hello fi01: Thanks for providing this POC code,it helps me a lot.As a beginner,I am researching a method to bypass PXN recently.However,something are confusing me.When we attempt to bypass PXN,we...
Hello, Although this is not an issue I just wanted to clarify something. When running setup_get_root(void *sk) to fill in the payload the *sk is the pointer to the sk...