关联漏洞
描述
Android Kernel Vulnerability (CVE-2019-2215) temporary root PoC
介绍
# CVE-2019-2215
Android Kernel Vulnerability (CVE-2019-2215) temporary root PoC.
It works on Google [Pixel 2](https://dl.google.com/dl/android/aosp/walleye-ota-qp1a.190711.020-d326cba7.zip)/[Pixel 2 XL](https://dl.google.com/dl/android/aosp/taimen-ota-qp1a.190711.020-4757f073.zip) (walleye/taimen) devices running the September 2019 QP1A.190711.020 image with kernel version-BuildID **`4.4.177-g83bee1dc48e8`**.
<p align=center>
<img src="images/preview.png"/>
</p>
#### Usage
Now, Binary support arm64 only.
```console
$ git clone https://github.com/jsirichai/CVE-2019-2215.git
$ cd CVE-2019-2215
$ adb push bin/cve-2019-2215 /data/local/tmp
$ adb shell
$ chmod +x /data/local/tmp/cve-2019-2215
$ ./data/local/tmp/cve-2019-2215
```
## Credits
https://github.com/kangtastic/cve-2019-2215
文件快照
[4.0K] /data/pocs/05a824513aa4baa55678e73092b51288b3ef96e7
├── [4.0K] bin
│ └── [ 24K] cve-2019-2215
├── [ 28K] cve-2019-2215.c
├── [4.0K] images
│ └── [ 72K] preview.png
├── [4.0K] kernel
│ └── [4.0K] x86_64
│ └── [ 15M] bzImage
├── [ 974] Makefile
└── [ 798] README.md
4 directories, 6 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。