You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Dirty Pipe (CVE-2022-0847) temporary root PoC for Android.
Targets
Currently only run on Pixel 6 with security patch level from 2022-02-05 to 2022-04-05.
Don't use on other devices or other versions. It must crash (reboot).
Dirty Pipe is finally patched on 2022 May security update on Pixel 6.
There is a port to Realme GT2 Pro by @rapperskull (#12). link
Certain version of Galaxy S22 is also vulnerable. But not ported yet. (#3)
WARNING
There is possiblity to brick your phone by using this tool. Use it at your own risk.
Especially, don't update/install magisk from magisk app. It will cause permanent brick.
How to use
Download binary from release page.
Setup adb (android platform tools).
Launch run.bat (For Windows) or run.sh (For Linux/Mac)
If you get 'adb' is not recognized ... errors, check to add adb to PATH.
Wait several seconds (~30s) until Magisk app is automatically installed.
Run adb shell then /dev/.magisk/su (Or simply su) to get root shell.
About Magisk
Don't use install button on magisk app. It will brick your phone.
Don't reboot even if magisk app request. It will lose temporary root.
Only support root access. No magisk/zygisk modules support.
Put mymod directory on kernel/private/google-modules/
Apply mymod/build-script-patch.patch to kernel/private/gs-google
Run build script
# For the first build
$ LTO=thin ./build/build.sh
# For faster rebuild (skip full rebuild)
$ SKIP_MRPROPER=1 SKIP_DEFCONFIG=1 LTO=thin ./build/build.sh