diff --git a/SecurityExploits/Android/Mali/CVE_2022_38181/README.md b/SecurityExploits/Android/Mali/CVE_2022_38181/README.md index 71df73d..b89efc7 100644 --- a/SecurityExploits/Android/Mali/CVE_2022_38181/README.md +++ b/SecurityExploits/Android/Mali/CVE_2022_38181/README.md @@ -1,4 +1,4 @@ -## Exploit for CVE-2022-20186 +## Exploit for CVE-2022-38181 The write up can be found [here](https://github.blog/2023-01-23-pwning-the-all-google-phone-with-a-non-google-bug). This is a bug in the Arm Mali kernel driver that I reported in July 2022. The bug can be used to gain arbitrary kernel code execution from the untrusted app domain, which is then used to disable SELinux and gain root.