Skip to content

Commit 886f4a0

Browse files
committed
* how did this ever work?
- kill sysveri even more and leave no witnesses. - fix a bug that somehow wasn't breaking anything? - fix a rop bug regarding sys-v stack alignment. - provide more krop helper functions. - provide a smaller img (0x1800 bytes, also very compressible). see [#29] [#31] - add wk expl sanity check. - make sure pages accessed by kernel are locked. - try to reduce time spent with interrupts disabled. - @@@ Note: extensive testing has not been performed. it might be worse so panic at your own risk! @@@
1 parent 8a92cf3 commit 886f4a0

File tree

6 files changed

+640
-44
lines changed

6 files changed

+640
-44
lines changed

README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ The following patches are applied to the kernel:
1212
4) Custom system call #11 (`kexec()`) to execute arbitrary code in kernel mode
1313
5) Allow unprivileged users to call `setuid(0)` successfully. Works as a status check, doubles as a privilege escalation.
1414
6) (`sys_dynlib_load_prx`) patch
15-
7) Disable delayed panics from sysVeri
15+
7) Disables sysVeri
1616

1717
## Short how-to
1818
This exploit is unlike previous ones where they were based purely in software. Triggering the vulnerability requires plugging in a specially formatted USB device at just the right time. In the repository you'll find a .img file. You can write this .img to a USB using something like Win32DiskImager.

exfathax_pico.img

6 KB
Binary file not shown.

0 commit comments

Comments
 (0)