Open anonymix007 opened 3 weeks ago
Thank you for your interest in this exploit.
Sorry, but I cannot give you an exact answer to this question. There are too many differences between x86_64 and aarch64, and also between GNU/Linux distributions and Android.
For example, this exploit relies on CVE-2023-0597 to leak the kernel base address, and that CVE is x86-specific. You may consider using other techniques mentioned in the kasld repo, but there is no guarantee that they will work.
Is it possible to adapt this exploit to Android? Specifically, this device has kernel 6.1.25 (
Linux version 6.1.25-android14-11-g71b43c3e005a-ab10734328 (build-user@build-host) (Android (10087095, +pgo, +bolt, +lto, -mlgo, based on r487747c) clang version 17.0.2 (https://android.googlesource.com/toolchain/llvm-project d9f89f4d16663d5012e5c09495f3b30ece3d2362), LLD 17.0.2) #1 SMP PREEMPT Mon Aug 28 22:37:15 UTC 2023
), so it shouldn't include the fix.