TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Google, Xiaomi, and Huawei affected by zero-day flaw that unlocks root access

411 pointsby lp001over 5 years ago

18 comments

typical182over 5 years ago
To me, the biggest part of this story is:<p>1. Over two years ago, this was apparently detected automatically by the syzkaller kernel fuzzer, and automatically reported on its public mailing list. [1]<p>2. Over a year and a half ago, it was apparently fixed in the upstream kernel. [2]<p>3. It was apparently never merged back to various &quot;stable&quot; kernels, leading to the recent CVE. [3]<p>So you might read that and think &quot;Ok, probably a rare mistake&quot;...<p>...but instead:<p>4. This is apparently a _super_ common sequence of events, with kernel vulnerabilities getting lost in the shuffle, or otherwise not backported to &quot;stable&quot; kernels for a variety of reasons like the patch no cleanly longer applies.<p>Dmitry Vyukov (original author of syzkaller fuzzer that found this 2 years ago) gave a very interesting talk on how frequently this happens a couple weeks ago at the Linux Maintainer&#x27;s Summit, along with some discussion of how to change kernel dev processes to try to dramatically improve things:<p>slides: <a href="https:&#x2F;&#x2F;linuxplumbersconf.org&#x2F;event&#x2F;4&#x2F;contributions&#x2F;554&#x2F;attachments&#x2F;353&#x2F;584&#x2F;Reflections__Kernel_Summit_2019.pdf" rel="nofollow">https:&#x2F;&#x2F;linuxplumbersconf.org&#x2F;event&#x2F;4&#x2F;contributions&#x2F;554&#x2F;atta...</a><p>video: <a href="https:&#x2F;&#x2F;youtu.be&#x2F;a2Nv-KJyqPk?t=5239" rel="nofollow">https:&#x2F;&#x2F;youtu.be&#x2F;a2Nv-KJyqPk?t=5239</a><p>---<p>[1] <a href="https:&#x2F;&#x2F;twitter.com&#x2F;dvyukov&#x2F;status&#x2F;1180195777680986113" rel="nofollow">https:&#x2F;&#x2F;twitter.com&#x2F;dvyukov&#x2F;status&#x2F;1180195777680986113</a><p>[2] <a href="https:&#x2F;&#x2F;git.kernel.org&#x2F;pub&#x2F;scm&#x2F;linux&#x2F;kernel&#x2F;git&#x2F;stable&#x2F;linux.git&#x2F;commit&#x2F;drivers&#x2F;android&#x2F;binder.c?h=linux-4.14.y&amp;id=7a3cee43e935b9d526ad07f20bf005ba7e74d05b" rel="nofollow">https:&#x2F;&#x2F;git.kernel.org&#x2F;pub&#x2F;scm&#x2F;linux&#x2F;kernel&#x2F;git&#x2F;stable&#x2F;linux...</a><p>[3] <a href="https:&#x2F;&#x2F;mobile.twitter.com&#x2F;grsecurity&#x2F;status&#x2F;1180059539233804288" rel="nofollow">https:&#x2F;&#x2F;mobile.twitter.com&#x2F;grsecurity&#x2F;status&#x2F;118005953923380...</a>
评论 #21169097 未加载
评论 #21168895 未加载
评论 #21170414 未加载
评论 #21168876 未加载
评论 #21172244 未加载
评论 #21168950 未加载
arusahniover 5 years ago
After the recent disclosures about Apple vulnerabilities, I&#x27;ve seen a lot of (unwarranted, in my opinion) criticism from HN of Project Zero, specifically the accusation of non-Google bias. For those who hold this position, does this affect your stance?
评论 #21168753 未加载
评论 #21169049 未加载
评论 #21168506 未加载
评论 #21169134 未加载
评论 #21168821 未加载
评论 #21168454 未加载
kccqzyover 5 years ago
The bug is scaringly easy to trigger. It just takes four system calls, none of which are niche or take unusual arguments.<p><pre><code> int fd, epfd; struct epoll_event event = { .events = EPOLLIN }; fd = open(&quot;&#x2F;dev&#x2F;binder0&quot;, O_RDONLY); epfd = epoll_create(1000); epoll_ctl(epfd, EPOLL_CTL_ADD, fd, &amp;event); ioctl(fd, BINDER_THREAD_EXIT, NULL);</code></pre>
评论 #21169492 未加载
评论 #21171631 未加载
userbinatorover 5 years ago
This is another great chance to root your phone and take complete control of what you should rightly own.
评论 #21168738 未加载
评论 #21168788 未加载
评论 #21169262 未加载
评论 #21168343 未加载
bloudermilkover 5 years ago
The macro-level progression of digital security really worries me. Each day the attack surface grows, the number of bad actors grows, the number of internet-connected individuals grows, and the quantity and sensitivity of data per-capita grows.<p>Is there a well-researched theory that considers a &quot;breaking point&quot; in this pattern? Where we either a) accept that all data is at risk of being exposed or b) develop fundamental security patterns to privatize our data or c) something else?
mehrdadnover 5 years ago
&gt; <i>The researchers speculate the bug is being used by NSO, an Isreal-based group known to sell tools to authorities to exploit iOS and Android.</i><p>&gt; Due to evidence of in the wild exploit, we are now de-restricting this bug 7 days after reporting to Android.<p>Why is this a good idea?
评论 #21168206 未加载
评论 #21168188 未加载
评论 #21168201 未加载
评论 #21168225 未加载
评论 #21168175 未加载
评论 #21168191 未加载
ec109685over 5 years ago
&gt; It’s advisable that you don’t install apps from non-trustworthy sources, and use an alternate browser such as Firefox or Brave till the issue is fixed. We’ll keep you posted on any updates issued by phone makers.<p>The recommendation that other browsers are inherently protected doesn’t make sense. Any app with an rce bug could be a vehicle to exploit this Android bug.
cryptozeusover 5 years ago
“It’s advisable that you don’t install apps from non-trustworthy sources, ”<p>Unpopular opinion but this is why I prefer walled garden apple for my family then alternative.
评论 #21168768 未加载
评论 #21168780 未加载
评论 #21169087 未加载
评论 #21175124 未加载
评论 #21170321 未加载
评论 #21169472 未加载
z3t4over 5 years ago
Mobile phones, especially Android ones are very vulnerable as they rarely get updates, or if they get updates at all. And these devices are used for second factor security. And sometimes they are the only thing needed to get access to your entire life.
delibesover 5 years ago
&gt; However, if you install an application from an untrusted source, attackers can take advantage of that. Attackers can also take advantage of the bug if they pair it with vulnerabilities in the Chrome browser to render content.<p>So, you have to sideload an app or from some other source. Is it unreasonable to say don&#x27;t do that? How common is it anyway? I work with IT folks and only a few ever seem to load outside the Play store. Perhaps in other parts of the world it&#x27;s more common...?
评论 #21168521 未加载
评论 #21168304 未加载
评论 #21168282 未加载
评论 #21168296 未加载
评论 #21168570 未加载
评论 #21170697 未加载
评论 #21168501 未加载
评论 #21168347 未加载
app4softover 5 years ago
AWESOME!<p>Please, give me instruction to root my <i>Xiaomi Ido</i> until they fixed it! (updates on my phone disabled for a while)
arpaover 5 years ago
I see that samsung s series is also affected. The thing about the samsung phones is that you can root them, but that basically breaks the KNOX (secure folder) functionality forever (efuse AFAIR). Couldn&#x27;t this exploit be used to root the phones while preserving knox by not tripping the efuse?
jdcover 5 years ago
Proof on concept: <a href="https:&#x2F;&#x2F;bugs.chromium.org&#x2F;p&#x2F;project-zero&#x2F;issues&#x2F;detail?id=1942#c7" rel="nofollow">https:&#x2F;&#x2F;bugs.chromium.org&#x2F;p&#x2F;project-zero&#x2F;issues&#x2F;detail?id=19...</a>
klingonoperaover 5 years ago
&gt; <i>However, if you install an application from an untrusted source, attackers can take advantage of that.</i><p>I&#x27;m slightly confused: Do they mean <i>any</i> app or a <i>compromised</i> app?
评论 #21168363 未加载
评论 #21168374 未加载
asdfasgasdgasdgover 5 years ago
People, many on this very site, often erroneously claim that P0 does not disclose vulnerabilities in Google&#x27;s own products. Or they claim that Google gets favorable treatment, like the disclosure only of less severe bugs, or longer disclosure deadlines. Here is a countervailing datapoint.
walrus01over 5 years ago
Oppo A3, but not OnePlus 7 pro?
KibbutzDaliaover 5 years ago
This is why we need the kernel to be re-written in Rust ASAP -- to make these flaws a thing of the past.
评论 #21168691 未加载
OrgNetover 5 years ago
this is a feature and not a bug
评论 #21169268 未加载