About Kernel Vulnerabilities - AT&T Samsung Galaxy S7 Questions & Answers

So I am aware that SELinux is a thing , and while I understand it adds security to a certain degree (I don't know specifics but I don't want to delve too far into that), I also know that Towelroot for my old S5 was made because of a Kernel vulnerability .
What I'm saying is that I know SELinux has changed to fully enforcing since 5.0 , but could kernel vulnerabilities still be exploited before security updates and firmware patches ?
If so , will this do any good for root ? http://www.cvedetails.com/cve/CVE-2016-0728/

Bumping this only because I saw this:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1805
Google said that this can cause root and that users (G Flex users specifically) have already used it for exploitation . Any chance ? Someone here has to be knowledgeable on this stuff .
https://source.android.com/security/bulletin/2016-04-02.html
Scroll to the CVE

Related

Stagefright Vulnerability

With the new Stagefright vulnerability in the news right now, a lot of people are worried about their devices and information. I've been reading that Google has a patch for the bug, and that is has been applied to ASOP. Since we can't really rely on manufactures or carriers to patch this issue in a timely manner, or at all for our 2011 devices, is it possible that a flashable zip file could be created from the fix applied to ASOP that could be used on any ROM?

Stagefright Exploit as Root-possibility for S5 on Lollipop ?

Hey XDA- Members !
I hope my question wasn't already asked or is stupid( I sadly have no experience with programming and understanding for our loved mobile OS)
So, would it be possible to use the Stagefright exploit for rooting Android phones, specially the S5 on Android 5.0 ( best would be without triggering knox ) ?
In the Demo Video for the Stagefright Bug from Zimperium Labs was shown, how on a non-rooted Smartphone was gained Root-Acces in an ADB-Shell.
I saw a Thread on XDA where plans for rooting a Fire TV Stick with Stagefright Exploit where explained and the mentioned Video was mentioned, too.
I hope I didn't waste Space on the Servers on the XDA-Servers.
Sunbucks

Anyone built a kernel excluding the saftynet flag?

it being impossible to get around the saftynet checks because i have a unlocked bootloader i was reading from another phones thread that it can be bypassed by compiling a kernel from source and excluding/removing the flag that shows your phone as saftynet compatible therefor it wont check and always pass. but i have no knowledge on linux or compiling kernels so i was wondering if anyone has done it already?

Status of Secure Folder on rooted Oreo

I know this was discussed probably million times but there isn't a single good explanation if it will ever happen or impossible at all.
On Android 7.x I had My Knox running just fine with magisk and superstock kernel (it fakes knox 0x0) however on 8 I can't seem to make it work. Knox is ok but samsung pass and secure folder detect that the device is rooted, tried magisk hide on many apps but without success. The author of Superstock kernel said he don't have the device anymore and can't test it.
Thanks in advance for any meaningful info!
also looking to see if its supported on A8 2018... Oreo
rapid_rabbit said:
I know this was discussed probably million times but there isn't a single good explanation if it will ever happen or impossible at all.
On Android 7.x I had My Knox running just fine with magisk and superstock kernel (it fakes knox 0x0) however on 8 I can't seem to make it work. Knox is ok but samsung pass and secure folder detect that the device is rooted, tried magisk hide on many apps but without success. The author of Superstock kernel said he don't have the device anymore and can't test it.
Thanks in advance for any meaningful info!
Click to expand...
Click to collapse
In Nougat it was possible to use SPay,Secure Folder with tripped knox,but in oreo Samsung found the issue and patched it, the old method isn't working anymore,and no we can't fix it on Oreo.
Ask yourself how necessary Secure Folder is. I used it for 18 months. Rooted, and simply found good alternatives to the problem it was solving

LG G6 (H870) - Could someone create and provide SECURITY PATCHES for OREO ?

Could someone create and provide SECURITY PATCHES for OREO and for LG G6 ?
Please, if you don't know what you are talking about, don't answer this message !
(i.e. answers such as update to PIE (android 9 by LG) or even to android 10 as "LeCorbusier" says.
As every ADULT knows, after 2-3 years a top-notch phone such as LG G6 is not dead !
Mine, at least, in 2020 works very well with OREO, and my only problem is getting security patches for OREO (android 8) and STOP updates for PIE !
I don't need PIE OS (Android 9 by LG), and its so-called improvements !
All I need is "security patches for OREO (android 8) and apps patches for CAMERA and other things similar.
Therefore, I suggest DEVS to think about what they are truly doing : MANTAIN a system of consumerism that is void (such as brands), or help people not throw away phones that still work perfectly well !
Please, help me and help millions of people not over consuming Phones !
1. Oreo is outdated and no one is willing to spend so much time to develop security patches for Oreo. Because it's hard to integrate with LGE framework. You could try to use custom rom with newer security patch
2. Or try find developer and pay him. For a custom rom

Categories

Resources