5

[ROOT][SECURITY] Root exploit on Exynos

view full story
linux-howto

http://forum.xda-developers.com – Hi, Recently discover a way to obtain root on S3 without ODIN flashing. The security hole is in kernel, exactly with the device /dev/exynos-mem. This device is R/W by all users and give access to all physical memory :confused: ... what's wrong with Samsung ? Its like /dev/mem but for all. Three libraries seems to use /dev/exynos-mem:/system/lib/hw/camera.smdk4x12.so /system/lib/hw/gralloc.smdk4x12.so /system/lib/libhdmi.so Many devices are concerned :Samsung Galaxy S2 Samsung Galxy Note 2 MEIZU MX potentialy all devices who embed exynos processor (4210 and 4412) which use Samsung kern (HowTos)