So, v2.78 SR1 is what would have been v2.79 BETA before. We're moving from BETA to Service Release naming, so we can keep the version number for the next test release the same as the current stable release. This fix requires SuperSU to be updated by flashing the ZIP. The requirements are pretty extensive and your chances of being vulnerable are slim, but nevertheless I would recommend updating. If this happens, and your kernel is compiled with module loading support (most modern stock kernels have this disabled) and an exploit is used to gain uid 0, this then allows for a complete SELinux bypass and kernel pwn. This update brings primarily bugfixes to the su binary (related to suhide and Magisk compatibility), but there is one supolicy update of particular note as well:ĭue to an initialization bug, introduced in v2.68 BETA, some SELinux contexts (including shell and untrusted_app) could be granted sys_module capability. Some formatting may be lost, links may be dead, and images may be missing. NOTICE: This content was originally posted to Google+, then imported here.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |