Closed allgood closed 8 years ago
Just reboot your device and it will be back to normal
On this subject, can anyone explain how this exploit is able to write to pages that are backed by a file (in this case "/system/bin/run-as") on the "/system" partition which is mounted read-only?
Obviously it works pretty well (first time on my fully patched Nexus 5) - but how is that? Are the pages associated with the file data just being kept in a kernel page cache? If so, over time will it be likely that the exploited pages will be discarded from the page cache and reloaded from the backed file?
Just reboot your device and it will be back to normal
explained. thank you
Tested to see if my phone is vulnerable, and now, how is the procedure to remove it from there?
Will the presence of it there result in problems with OTA updates?
Best regards, Claudemir