Quadrooter affected - Xperia Z1 Compact General

What can I do?
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}

CmDaRkShAdOw said:
What can I do?
Click to expand...
Click to collapse
You are not infected, but affected. It is a big difference. Get a rom that is maintained, as opposed to abandoned....

optimumpro said:
You are not infected, but affected. It is a big difference. Get a rom that is maintained, as opposed to abandoned....
Click to expand...
Click to collapse
Hmm..I'm using dstrikerz1 but sp001(the newest version is sp002, but I prefer that) update is planned..changing rom will help? I never met that virus, so I don't know what to do right now.

CmDaRkShAdOw said:
Hmm..I'm using dstrikerz1 but sp001(the newest version is sp002, but I prefer that) update is planned..changing rom will help? I never met that virus, so I don't know what to do right now.
Click to expand...
Click to collapse
I don't think you fully understand: the only way to patch the vulnerabilities is to change the code and re-build the rom. No stock rom can be build from sources by anyone, except OEM, because stock roms are closed source, i.e., code is not available. They can only be moded: delete an app, change wallpaper etc... . So, no matter how many more releases of moded stock roms can appear, none of them will include any security patches after the last official release, which was about the end of last year....

optimumpro said:
I don't think you fully understand: the only way to patch the vulnerabilities is to change the code and recompile the rom. No stock rom can be recompiled by anyone, except Sony, because stock roms are closed source, i.e., code is not available. They can only be moded: delete an app, change wallpaper etc... . So, no matter how many more release of moded stock roms can appear, none of them will include any security patches after the last official release, which was about the end of last year....
Click to expand...
Click to collapse
I didn't understand because I told you that this is my first time with this. Ehh so I must accept this... Thank for reply.

The problem here is that most of these vulnerabilities (with the exception of the first, which is in the kernel) are inside proprietary files from qualcomm. So binaries which we don't have access to the source code to. Chances of this ever being fixed on our phones are pretty slim to none. The only chance might be the release of patched binaries for MM AOSP, which could then be used in custom (non-stock) ROMs.

Also we all just needs to "Keep calm and carry on".
We are also all "affected" to be run down by a car in the street, but we some how don't get run down every day.
How: we don't walk out on the street in front of a car. We carefully look both sides first.
Just as we don't download and install unknown apps from unknown sources

This is A gpu error, only you need is to check new apks, and be sure that are safe, before installing.
Nothing bad.
Sent from my XT687 using xda premium
---------- Post added at 01:50 PM ---------- Previous post was at 01:49 PM ----------
[QuadRooter?]
http://forum.xda-developers.com/showthread.php?t=3435492
[QuadRooter?]
Sent from my XT687 using xda premium
---------- Post added at 01:51 PM ---------- Previous post was at 01:50 PM ----------
Qualcomm Vulnerability - Possible Root?
http://forum.xda-developers.com/showthread.php?t=3435425
Qualcomm Vulnerability - Possible Root?
Sent from my XT687 using xda premium
---------- Post added at 01:54 PM ---------- Previous post was at 01:51 PM ----------
They NEVER will update our roms, all they are piggest dollar bill, saying to buy a new CVE BUG ERRORED DEVICE (AFTER ONE YEAR EXACTLY)
Sent from my XT687 using xda premium

derf elot said:
The problem here is that most of these vulnerabilities (with the exception of the first, which is in the kernel) are inside proprietary files from qualcomm. So binaries which we don't have access to the source code to. Chances of this ever being fixed on our phones are pretty slim to none. The only chance might be the release of patched binaries for MM AOSP, which could then be used in custom (non-stock) ROMs.
Click to expand...
Click to collapse
Not true. They are all open source. In fact most Qualcomm's fixes are open source. Just because Google is lazy to reference sources and instead chooses to publish binaries, doesn't mean they are not open source. You just have to get them from Code Aurora directly.
Here they are:
CVE-2016-2059: https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=9e8bdd63f7011dff5523ea435433834b3702398d
CVE-2016-2503 and 4: https://www.codeaurora.org/use-after-free-due-race-conditions-kgsl-module-cve-2016-2504-cve-2016-2503
CVE-2016-5340: https://www.codeaurora.org/invalid-path-check-ashmem-memory-file-cve-2016-5340

Yes, I was mis-informed by an article I read yesterday.
I found those patches last night and made a new build. Funnily though, CVE-2016-5340 is still shown as unfixed in the program, but other people are having that problem as well it seems. So for now I'm blaming the App

This is why i suspect if this app haves a png inside , for when we open, display "device affected" by a fake scanner
Sent from my XT687 using xda premium

derf elot said:
Yes, I was mis-informed by an article I read yesterday.
I found those patches last night and made a new build. Funnily though, CVE-2016-5340 is still shown as unfixed in the program, but other people are having that problem as well it seems. So for now I'm blaming the App
Click to expand...
Click to collapse
The app and the whole Checkpoint's blog are nothing more than a deceitful commercial pitch for business customers. I don't think there is even a way to know whether vulnerabilities are fixed on a live device. It is all crap...
---------- Post added at 09:36 AM ---------- Previous post was at 09:31 AM ----------
Dethfull said:
This is why i suspect if this app haves a png inside , for when we open, display "device affected" by a fake scanner
Click to expand...
Click to collapse
Could you post the app please. We can expose Checkpoint if the app is fake....

You find this as Quadroot Scanner in goglebley store or 9apps store
If you read the checkpoint site, they explicitly are promoting goglebley store with this invalid argument :
"OnLy dOwnLoAD aPps fRoM goGleBlEy sToRe"
Lamentable!
:sly:
Sent from my XT687 using xda premium

Just to be 100% sure: if I use a stock ROM (as we know there will be no updates...) the only way to protect myself is to:
stop using it and use some custom ROM
use some apk scanner (e.g. AVG), do not install from unknown sources, do not install suspicious apps (and "that's all")
So no way to e.g. somehow patch my ROM.
As a second question, I know that I can be hit by a car at any time but am I safe on a stock ROM? It is fast and works fine for me. Btw I would need some OS where I can download my company mails and things like that which need a "very secure environment"... and also a very stable one, as I know current Marshmallow ROMs for Z1 are unstable.

You don't need follow google craps, you may stay installing unknown source apks, by scanning after...
Sent from my XT687 using xda premium

Related

[ROM][4.3.1][UNOFFICIAL] Carbon

About Carbon
CarbonRom is an aftermarket firmware based on the Android Open Source Project. We are dedicated to fast, stable, and feature-filled roms, honesty and communication with our users, and openness with our code. We like frequent builds, with the very latest and greatest hardware support and fixes. We strive to not only provide you with the best rom we can build, but also to give back to the Android community and our fellow developers. For us, this is about creating something we can be proud of and hope you will enjoy.
Please feel free to look at, build, and use our code on CarbonDev GitHub.
We would like to thank CyanogenMod for their device trees, framework/settings mods and their code that was incorporated into this project. We also extend our gratitude to the devs whose code that we have incorporated. Proper authorship has been maintained and can be viewed on our repository.
Special thanks also go to Slim Rom for some of their features, PA, AOKP, and anyone else we may have borrowed commits from that hasn't been mentioned here. If you feel you have been unfairly left out, please - let us know.
While we make every effort to test these builds as much as possible, we are not responsible for anything that may happen to your device, family, pets, or perception of reality. We ask that you do your part to know your device and know how to recover from problems before you flash! If you have questions, ask your fellow users or ask us in #teamcarbon on freenode IRC.
Features
Simply stated, we can't really list features here. There are too many and they change too frequently, and we now support a truly insane number of devices. Chances are, if you like a feature, we have it already. Seriously.
Screenshots
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
Carbon Updates
Join us on these Social Media Channels to keep yourself up-to-date on all the latest Carbon news, updates, contests, and more! Join our completely open Google+ community for insider conversation with devs and other users.
Download Carbon
http://goo.im/devs/KINGbabasula/GalaxySAdvance/Carbon
Support
We spend an astonishing amount of time developing this software. We can't spend much time on XDA as a result, so if you need support, please try the following:
1) Search. Search, search, search. Yes, you. I don't care how unique or important your question is, it's very likely someone has adressed it already. Especially if you're even close to new at this.
2) Read our FAQ, which can be found on our goo.im page linked above. It's new, but expanding fast. Just like us!
3) Ask a question in your device forum. Someone will no doubt try to help you. Warning: this help may come in the form of telling you it's a dumb question that has been asked before. See step 1 - such are the perils of asking questions when you haven't done the research yourself. Android is about helping yourself.
4) Join our G+ Community: http://community.carbon-rom.com This is where we spend the bulk of our time and the best way to reach us and other community members. We update and frequent this community far more than XDA, simply due to time constraints and the convenience of G+.
5) Ask a question on our IRC channel. Connect to #teamcarbon on irc.freenode.net or click here. You'll find several other Carbon fans and usually one or more devs as well. Please be polite.
Who is Team Carbon?
Andros11
BigShotRob
Bionic Beast
dg4prez
Kejar31
mattmanwrx
morfic
nocoast
pixeldotz
slick_rick
winner00
XDA:DevDB Information
Carbon ROM, a ROM for the Samsung Galaxy S Advance I9070
Contributors
KINGbabasula
ROM OS Version: 4.3.x Jellybean
ROM Kernel: Linux 3.0.x
ROM Firmware Required: 4.1.2 +
Version Information
Status: Beta
Created 2013-12-31
Last Updated 2013-12-31
Reserved
Good luck, bro! :highfive::good:
Now, i like my 9070 , thx king
Woohoo yet another rom
Thanks @KINGbabasula
Sent from my GT-I9070 using Tapatalk
the ROM isnt booting..
Its stuck on s advance logo..
Can anyone confirm??
Yea, stuck there, not proceeding
:crying::crying:
dagger said:
the ROM isnt booting..
Its stuck on s advance logo..
Can anyone confirm??
Click to expand...
Click to collapse
Ops i think i uploaded wrong file... :silly: i'll have to build again and upload correct file so it'll take some time. Sorry
Sent from my GT-I9070 using xda app-developers app
KINGbabasula said:
Ops i think i uploaded wrong file... :silly: i'll have to build again and upload correct file so it'll take some time. Sorry
Sent from my GT-I9070 using xda app-developers app
Click to expand...
Click to collapse
i saw a folder name falconite
i'm curious if i can flash the rom
Thanks
Waiting stable version
false alarm
clerfa21 said:
false alarm
Click to expand...
Click to collapse
What you mean? Is booting?
Wow!carbon rom..my favourite rom..thanx king! And happy new year to all..hope for a better year for our beloved s advance!
Sent from my GT-I9070 using xda premium
Force said:
What you mean? Is booting?
Click to expand...
Click to collapse
I don't know, I didn't try it at all..I just reply what King says "Ops i think i uploaded wrong file... i'll have to build again and upload correct file so it'll take some time. Sorry"
bro. plz give full info. .. do I need to flash gapps ? and installation procedure .? rom booting perfectly ?
Heartstoler1991 said:
bro. plz give full info. .. do I need to flash gapps ? and installation procedure .? rom booting perfectly ?
Click to expand...
Click to collapse
This release isn't booting..
Wait for the next release
.
Sent from my GT-I9070 using Tapatalk
new build released, anyobe tried it?
Sent from my Parandroid Android 3.99
iiD4x said:
new build released, anyobe tried it?
Sent from my Parandroid Android 3.99
Click to expand...
Click to collapse
I try it and report.
---------- Post added at 01:59 PM ---------- Previous post was at 01:14 PM ----------
Tried from stock jb 4.1 with temporary CWM and not boot.Stuck like first build.I will try with TWRP too.
Force said:
I try it and report.
---------- Post added at 01:59 PM ---------- Previous post was at 01:14 PM ----------
Tried from stock jb 4.1 with temporary CWM and not boot.Stuck like first build.I will try with TWRP too.
Click to expand...
Click to collapse
Please download again
Sent from my GT-I9070 using xda app-developers app
Tried again with TWRP from omni 4.3 and not booting.I try again with boot.img method like cm11,maybe will work.I will edit this post.
---------- Post added at 02:54 PM ---------- Previous post was at 02:47 PM ----------
KINGbabasula said:
Please download again
Sent from my GT-I9070 using xda app-developers app
Click to expand...
Click to collapse
Build not was fully uploaded?I downloaded without problems,is not corrupted.

[Desire 816][a5][6.0.1][CM-13.0][ROM link!]

So, somehow I got Marshmallow booting on my a5.
Right now enough works for me to attempt to daily-driver with it!
I'll share the alpha since I have some sort of network connectivity going.
I keep most of my stuff on public github anyway. use the cm-13.0 branch. not everything needed is up there but the basic device folder and vendor folders are. android_device_htc_a5 and android_vendor_htc. Anything done outside those folders in CM is just dodging build errors as they pop up.
It's still fun to see any Android 6.0 on this before the official HTC release.
I'm putting this in general so feel free to share opinions etc.
Bear in mind this development happens in my free time so progress may be sporadic.
ROM thread: http://forum.xda-developers.com/desire-816/development/rom-t3282978
Look!
Screenshots!
And they're not even photoshopped.
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
Well Hell Yeah.
Good job! We need cm13 for the a5....
Good job squid
Sent from my SM-N920P using Tapatalk
Keep up the good work, supersquid!!
Just amazing! I am so happy that you have taken this on. I thought we were done for with this phone as far as new development was concerned. Thank you and good luck ?
Sent from my HTC Desire 816 a5_chl running Unofficial CM 12.1 ? on Virgin Mobile USA
At this very moment a usable build is uploading to my androidfilehost a5 rom folder.
Usable, at least, for the Virgin Mobile chl model.
Working LTE, MMS, SMS, call in and call out.
I think the location is working too but not completely sure.
I'll put up a proper ROM thread in the morning since it'll take a while to upload and the rules say I can't post it until it's actually available for download.
Regardless you can grab the first alpha release as soon as it gets up there.
Happy flashing.
Standard rules apply, clean flash strongly recommended, wipe system too or you may have gapps issues should you be using them.
Of course if it somehow fries your phone I'm not responsible.
Enjoy the first taste of Marshmallow on the a5 courtesy of all the hard work upstream at CM, and what patchwork I've hacked together for the latest greatest.
'Ware, WiFi won't turn on so skip it during setup, and messing with Bluetooth causes reboots.
And it's an alpha so it may scare your nice old granny.
ROM thread
http://forum.xda-developers.com/desire-816/development/rom-t3282978
Can u give the Link plz..
Sent from my Desire 816 dual sim
bigsupersquid said:
At this very moment a usable build is uploading to my androidfilehost a5 rom folder...
Click to expand...
Click to collapse
nareshnani142 said:
Can u give the Link plz..
Sent from my Desire 816 dual sim
Click to expand...
Click to collapse
It's probably got the same dual sim problems as cm12... though you get to be a guinea pig f you so choose.
and like I said, it's still uploading and will take a little while (translated: couple hours maybe.)
androidfilehost said:
uploading 30MB of 281.6MB uploaded
Click to expand...
Click to collapse
sim not working
i hv htc desire 816 dual sim a5dwg plz give me solution
---------- Post added at 03:22 AM ---------- Previous post was at 03:17 AM ----------
i have htc desire 816 a5 dwg plz help ....
**** u dude
nareshnani142 said:
**** u dude
Click to expand...
Click to collapse
What are you talking about?!?
Sent from my 710C using Tapatalk
Link is broken not working
nareshnani142 said:
Link is broken not working
Click to expand...
Click to collapse
Dude for whatever reason the link is down but if you go into the Rom thread it is literally right there. You shouldn't be so rude to these amazing devs, they put tons of their time and effort Into building these for free.
Sent from my 710C using Tapatalk
Tried it yesterday no sim detected (AIRTEL) didn't test WiFi (I don't have any WiFi at that time).. Camera works..
What is this?
nareshnani142 said:
Tried it yesterday no sim detected (AIRTEL) didn't test WiFi (I don't have any WiFi at that time).. Camera works..
Click to expand...
Click to collapse
Sure it was cm13 and not cm12? I've not ever gotten camera to connect in cm13 yet.
The no sim detected sounds right though.
Ya truly its cm-13.0-20151231-UNOFFICIAL-a5.zip
---------- Post added at 02:33 PM ---------- Previous post was at 02:30 PM ----------
[https://androidfilehost.com/?fid=24269982087019278] is good,have a look at it!
nareshnani142 said:
Ya truly its cm-13.0-20151231-UNOFFICIAL-a5.zip
---------- Post added at 02:33 PM ---------- Previous post was at 02:30 PM ----------
[https://androidfilehost.com/?fid=24269982087019278] is good,have a look at it!
Click to expand...
Click to collapse
Are you using a different camera? Dirty flash or clean? Which model a5? (chl, ul, etc?)

Leaked Cert Files for Root?

I don't want to get anyone's hopes up here.
I spent a few hours of downtime online searching for progress updates and found this Qualcomm.zip file.
Inside, was a qpsa.zip file. Within that are a couple of security certificates. Just for the heck of it I installed them.
Here are some pictures to better explain what I'm talking about.
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
Any ideas if these will be helpful in any way?
EDIT: Doesn't appear to be anything special. Deleted attachments and reporting thread for deletion/closing.
Binary100100 said:
I don't want to get anyone's hopes up here.
I spent a few hours of downtime online searching for progress updates and found this Qualcomm.zip file.
Inside, was a qpsa.zip file. Within that are a couple of security certificates. Just for the heck of it I installed them.
Here are some pictures to better explain what I'm talking about.
Any ideas if these will be helpful in any way?
Click to expand...
Click to collapse
Thank you, where ever you found that , you should poke around some more
---------- Post added at 06:28 PM ---------- Previous post was at 06:08 PM ----------
@Binary100100 I mentioned your post here on the boot loader bounty page http://forum.xda-developers.com/tmo...pic-thread-unlocked-bootloader-t3359613/page2
goofwear said:
Thank you, where ever you found that , you should poke around some more
---------- Post added at 06:28 PM ---------- Previous post was at 06:08 PM ----------
@Binary100100 I mentioned your post here on the boot loader bounty page http://forum.xda-developers.com/tmo...pic-thread-unlocked-bootloader-t3359613/page2
Click to expand...
Click to collapse
Not sure if we can use them for an exploit or not. I'm not advanced enough to even know what I'm even looking at.
Binary100100 said:
I don't want to get anyone's hopes up here.
I spent a few hours of downtime online searching for progress updates and found this Qualcomm.zip file.
Inside, was a qpsa.zip file. Within that are a couple of security certificates. Just for the heck of it I installed them.
Here are some pictures to better explain what I'm talking about.
Any ideas if these will be helpful in any way?
Click to expand...
Click to collapse
How did you install them?
Probably just Qualcomm self-signed certificate.
Still need private key to decrypt it to make it useful
Sent from my SM-G935T using XDA-Developers mobile app
Were those just public keys? Looks like the root cert in a certificate chain, these are usually public keys used to authenticate that data or code is signed by a specific vendor.
For example you would install the root cert on a machine when you are self signing application code, and you want that machine to be able to validate that the application was signed with your keys, and mark applications signed with your keys as trusted on that machine.
*EDIT*
Binary100100 said:
Any ideas if these will be helpful in any way?
Click to expand...
Click to collapse
Hmm, I see that the private keys appear to be sitting there in your filesystem. Can you generate a code signing certificate against that CA? Should be able to do it with the OpenSSL suite.
I don't have any ideas to what these are but they don't seem widely known. I'm hoping that someone clever might be able to make something of it.
I am not sure about it but how does gaining private key of Qualcomm get you root access to android os
viking2.0 said:
I am not sure about it but how does gaining private key of Qualcomm get you root access to android os
Click to expand...
Click to collapse
No idea. Like I had said, I don't even know what any of this is. Do you? What are these files used for? Who (general public) would have a need for these files and why? Where would you acquire these for such a purpose?
Why dont you look up the basics of pki that will answer your question
123421342 said:
Why dont you look up the basics of pki that will answer your question
Click to expand...
Click to collapse
Fair enough then. I appears that it's useless. I'll remove the attachments and report this thread for closing.
Binary100100 said:
Fair enough then. I appears that it's useless. I'll remove the attachments and report this thread for closing.
Click to expand...
Click to collapse
Are you sure you want to remove it , it may be of some use with the private keys, what about to code in there about the boot loader?
http://mobile.developer.com/ws/android/encrypting-with-android-cryptography-api.html
Sent from my SM-G935T using XDA-Developers mobile app
---------- Post added at 08:57 PM ---------- Previous post was at 08:55 PM ----------
This is a PDF
https://www.google.com/url?sa=t&sou...qjqY8SSv5f0m34s7w&sig2=dmtMKgBDZQW8CgH4dPBcIw
Sent from my SM-G935T using XDA-Developers mobile app
---------- Post added at 09:00 PM ---------- Previous post was at 08:57 PM ----------
http://developer.android.com/reference/java/security/PublicKey.html
Sent from my SM-G935T using XDA-Developers mobile app

Security OTA update released for Max

http://www.verizonwireless.com/support/motorola-droid-ultra-maxx-update/
Current Software Update Benefits
Software Version: 24.21.7.obake_verizon.Verizon.en.US (Droid Ultra)
Software Version: 24.21.7.obake-maxx_verizon.Verizon.en.US (Droid Maxx)
The current software update gives you the most up to date Android™ security patch on your device.
Next steps and additional links:
Click to expand...
Click to collapse
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
Still not a lollipop update.
Even lollipop is so old with the new android N news everywhere. This update fixes stagefright issue. At least,we got the newest security patch.
Sent from my XT1080 using XDA-Developers mobile app
I am very glad that Motorola and Verizon are giving some attention to our 'old fella' now. While it is sad that they did not give us L or M, at least they released the security update.
Kitkat is perfect for me.
I bought a X Play (Droid Maxx 2), it even performs worse than the Droid Maxx.
Sent from my XT1562 using XDA Labs
Hi.
Yesterday i updated the new Patch 24.21.7.obake-maxx_verizon.Verizon.en.US and now my phone restarting when i insert SIM.
when i pulled out the SIM card phone is working fine.
What the ****.....
Using Driod maxx Ultra
---------- Post added at 12:14 AM ---------- Previous post was at 12:05 AM ----------
[/COLOR]
jdawg334 said:
http://www.verizonwireless.com/support/motorola-droid-ultra-maxx-update/
Click to expand...
Click to collapse
huatz84 said:
Still not a lollipop update.
Even lollipop is so old with the new android N news everywhere. This update fixes stagefright issue. At least,we got the newest security patch.
Sent from my XT1080 using XDA-Developers mobile app
Click to expand...
Click to collapse
Were you rooted?...able to keep root after the update?
Thanks.
Good question @Mangu.
Im holding off on running the update myself.
Mangu said:
---------- Post added at 12:14 AM ---------- Previous post was at 12:05 AM ----------
[/COLOR]
Were you rooted?...able to keep root after the update?
Thanks.
Click to expand...
Click to collapse
Yes..My Maxx is rooted. It's safe and working fine after update.
Sent from my XT1095 using XDA-Developers mobile app
huatz84 said:
Still not a lollipop update.
Click to expand...
Click to collapse
Motorola said in February there would be no LP update.
http://www.techtimes.com/articles/1...unts-for-droid-turbo-2-and-maxx-2-instead.htm
And only 6 days to qualify for the $100 discount on a Turbo2 or Maxx2. (Mini users are SOL. No new options for a smaller device)
Took the update. Still rooted and everything works fine.
For those that went that route, Entitlement Bypass Apk still works as usual too.
But remember to restore the original recovery, instead of twrp.
Heh.. whups..
Sent from my XT1080 using XDA Free mobile app
where can i download this firmware on pc as a backup
So it's clear this was a update to there stagefright security patch that apparently took no affect in the SU6-7.3 update. Well I tested my bootloader unlock exploit and was unsuccessful. My kernel would not load and modules as expected. The Trustzone module wasnt loaded to the kernel so the SMC(Secure Monitor Call) couldn't be sent to the Secure world to Rewrite the DWord values. I think my kernel module needs to be recompiled and tested. If anyone is willing to risk a droid Ultra/Maxx/Mini on this bootloader exploit please DM me and I'll send you the details! Cheers! Posted by last Member to be working with droid Maxx developments ?
any best way to root the device having this update installed ???
As i am unable to root the device and stuck with KITKAT and wants to try Custom Roms.
Any help will be appreciated, Basically i am LG guy so dont know anything about MOTO.
SignatureBoy said:
any best way to root the device having this update installed ???
As i am unable to root the device and stuck with KITKAT and wants to try Custom Roms.
Any help will be appreciated, Basically i am LG guy so dont know anything about MOTO.
Click to expand...
Click to collapse
It's a security path, you should be fine downgrading
JH1108 said:
It's a security path, you should be fine downgrading
Click to expand...
Click to collapse
can you please guide me how to any easy way ???
LG and Samsung sure are the easiest i must say
Looking for SU6-7.7 fastboot file
bootloader/have 3 ultras willing to test/risk 2 of them
DROID_4_UsEr said:
So it's clear this was a update to there stagefright security patch that apparently took no affect in the SU6-7.3 update. Well I tested my bootloader unlock exploit and was unsuccessful. My kernel would not load and modules as expected. The Trustzone module wasnt loaded to the kernel so the SMC(Secure Monitor Call) couldn't be sent to the Secure world to Rewrite the DWord values. I think my kernel module needs to be recompiled and tested. If anyone is willing to risk a droid Ultra/Maxx/Mini on this bootloader exploit please DM me and I'll send you the details! Cheers! Posted by last Member to be working with droid Maxx developments
Click to expand...
Click to collapse
---------- Post added at 06:05 AM ---------- Previous post was at 06:01 AM ----------
[
phones are waiting for some help
---------- Post added at 06:08 AM ---------- Previous post was at 06:05 AM ----------
[email protected]
stan34658 said:
---------- Post added at 06:05 AM ---------- Previous post was at 06:01 AM ----------
[
phones are waiting for some help
Click to expand...
Click to collapse
Can i downgrade to su6-7 after taking this update? I want to root this phone and on another maxx i could downgrade from su6-7.3 to su6-7. Has anyone tried doing this?
There are many critical vulnerabilities patched by Google in the June update.
https://source.android.com/security/bulletin/2016-06-01.html

QuadRooter: New Android Vulnerabilities in Over 900 Million Devices

Check Point today disclosed details about a set of four vulnerabilities affecting 900 million Android smartphones and tablets that use Qualcomm® chipsets. The Check Point mobile threat research team, which calls the set of vulnerabilities QuadRooter, presented its findings in a session at DEF CON 24 in Las Vegas.
QuadRooter is a set of four vulnerabilities affecting Android devices built using Qualcomm chipsets. Qualcomm is the world’s leading designer of LTE chipsets with a 65% share of the LTE modem baseband market. If any one of the four vulnerabilities is exploited, an attacker can trigger privilege escalations for the purpose of gaining root access to a device.
Click to expand...
Click to collapse
Source: Check Point
I just ran Check Point's QuadRooter Scanner on my Z5, and it listed four vulnerabilities at present.
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
Model: E6653
Android version: 6.0.1
Android security patch level: April 1, 2016
Baseband version: 8994-FAAAANAZQ-00046-27
Kernel version: 3.10.84-v34, [email protected] #210
Build number: 32.2.A.0.253 (SG Customized)
Vulnerabilities:
* CVE-2016-2059
* CVE-2016-2504
* CVE-2016-2503
* CVE-2016-5340
I haven't done research on each vulnerability, but generally there's not much we can do as end users. The chipset vendor (Qualcomm) has to deliver fixed device drivers to the distributors/carriers in order to protect users from these vulnerabilities. In the past, we have seen some home-grown solutions to CVE vulnerabilities (e.g., StageFright), but I don't know off-hand if these vulnerabilities can be mitigated in such a way. This will hopefully just serve to make people aware that of these problems, which can be exploited without any special permissions on the Android platform. Be careful what you download/sideload!
I don't see it as a problem I see it as possible temp root for locked bootloader to fool Kernel checks
Sent from my E6653 using Tapatalk
the two Kernel fixes can be applied to our source:
https://github.com/zachariasmaladro...mmit/524bf18c672de33ce41593653876cbd597993429 [CVE-2016-2059] net: ipc_router: Bind only a client port as control port
https://github.com/zachariasmaladro...mmit/ed2fa29277ce37e6d3d3db48188db5e2d07e428d ashmem: fix CVE-2016-5340
great overview post, @xasbo thanks !
zippy01 said:
I don't see it as a problem I see it as possible temp root for locked bootloader to fool Kernel checks
Click to expand...
Click to collapse
If it can be used for temp root, it can just as easily be used for malware. Mobile browsing is more popular than ever; with the right mix of exploits or even just careless users, it is easy to take over a phone for nefarious purposes. I know how to be careful running unknown-source software, and maybe you do too, but the vast majority of people don't.
zacharias.maladroit said:
the two Kernel fixes can be applied to our source:
Click to expand...
Click to collapse
Nice to see you're on top of it! :good:
zippy01 said:
I don't see it as a problem I see it as possible temp root for locked bootloader to fool Kernel checks
Sent from my E6653 using Tapatalk
Click to expand...
Click to collapse
I agree with u ?
Sent from my E6633 using XDA-Developers mobile app
Though if we could get a temp root on LB we could always refine the method for a permanent root on LB. Then, on the post from whichever genius makes the permanent root, have a damn neon flashing sign saying "OKAY, GO PATCH THIS NOW" via another kernel (as already done above) or a software fix as part of the "tutorial" post that would eventually be made.
Any news about it?? ?
Enviado desde mi Z1 mediante Tapatalk
Quadrooter affected
http://forum.xda-developers.com/showthread.php?t=3435585
Pure crappy fake app with a png image promoting goglebley store apps.
Sent from my XT687 using xda premium
---------- Post added at 02:02 PM ---------- Previous post was at 02:00 PM ----------
Qualcomm Vulnerability - Possible Root?
http://forum.xda-developers.com/showthread.php?t=3435425
Qualcomm Vulnerability - Possible Root?
Sent from my XT687 using xda premium
---------- Post added at 02:03 PM ---------- Previous post was at 02:02 PM ----------
Sent from my XT687 using xda premium
Noticed that QuadRooter was updated within the last day or so, and the list vulnerabilities was reduced to:
* CVE-2016-2059
* CVE-2016-2504
Apparently it's not scanning for 5340 and 2503 anymore? It included a link to the ZoneAlarm blog instead.
Crap! I will bypass this HORRIBLE UV ANDROED 6
This is HORRIBLE LITERALLY!
THE WHITE REPUGNANT STYLE IS A MIRROR BY THE CHIT OF DAMN GOOGLE INC BLANK MIND!
I WILL BUY MY NEXT DEVICE
IN 30 YEARS, WHEN THE GOOGLE STUPIDS HAS CRASHED AND THE OS HAVES CONCURRENT >>LEGAL<< VARIANTS, AND ALL ZOMBIES ARE CURED AND STOPPED BE GOOGLE'S SLAVES AND SUCKERS!
Sent from my XT687 using xda premium

Categories

Resources