← Back to context

Comment by ycombinatrix

3 days ago

How on earth is this a "vulnerability"? It needed adb shell access.

The same way being allowed to install programs on your own computer is called "jailbreaking".

  • "Jail", on the other hand, is a great metaphor for a walled garden.

It allowed anyone with knowledge to use the cell network in ways the operator of the cell network didn't like. This is generally considered a major issue and can attract serious legal repercussions for a radio device maker that doesn't take care to enforce only the allowed uses.

An interesting note from the Github conversation on it:

"Google's implementation of the security patch is strange, clearly targeting the Pixel IMS rather than fixing the shell's ability to modify carrier configurations. I'm actually worried that the ongoing backlash will ultimately lead Google to remove the MODIFY_PHONE_STATE permission from the shell to properly fix this issue"

https://github.com/kyujin-cho/pixel-volte-patch/issues/384

From the article:

>To gain these elevated privileges, Pixel IMS uses Shizuku, an open source Android app that lets other apps run processes as the shell user.

It's possible for an app to use wireless debugging to debug the phone it's running on to get shell permissions.