From b209d0e45893d330f1e7c512b08250b16d20a990 Mon Sep 17 00:00:00 2001 From: Man Yue Mo Date: Mon, 23 Jan 2023 15:23:20 +0000 Subject: [PATCH] Correct CVE number. --- SecurityExploits/Android/Mali/CVE_2022_38181/README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/SecurityExploits/Android/Mali/CVE_2022_38181/README.md b/SecurityExploits/Android/Mali/CVE_2022_38181/README.md index 71df73d..b89efc7 100644 --- a/SecurityExploits/Android/Mali/CVE_2022_38181/README.md +++ b/SecurityExploits/Android/Mali/CVE_2022_38181/README.md @@ -1,4 +1,4 @@ -## Exploit for CVE-2022-20186 +## Exploit for CVE-2022-38181 The write up can be found [here](https://github.blog/2023-01-23-pwning-the-all-google-phone-with-a-non-google-bug). This is a bug in the Arm Mali kernel driver that I reported in July 2022. The bug can be used to gain arbitrary kernel code execution from the untrusted app domain, which is then used to disable SELinux and gain root.