Can someone please post, or is there a way I can find out what kernel version comes with each update on the a71?? Only certain kernel versions work with the exploit (5.10). So, I'm thinking to update my a71 to current updates... IF the current updates come with newer kernel?
theres a new exploit 'dirtycred'! theres some good info here on it and WORKING ANDROID CODE (unreleased for now):
https://twitter.com/i/web/status/1544379506659663872
it appears like older kernels wont work with the exploit according to one of the devs.
I'm thinking to update my a71 5g phone with the latest one UI 4.1 update, but unsure of the kernel version included??
Can anyone please post what kernel versions come in the a71 5g updates? or, link me where i can find this? in all the update documentation, i dont see any kernel version info
also, i see there IS a "dirty pipe" (not dirtycred) exploit fix in the latest updates. i am unsure if this will also fix dirtycred or not, though i dont think it will
Related
So with new rom updates based on newer versions, is it really necessary to update the modem and bootloader that is also associated with the new base?
My baseband is COF6 but im running xstolite 2.3 and possibly looking to try other roms based on newer bases.
In asking this, I also wonder if this could affect ability to use android pay too
Bump..
What is the newest firmware for the G920F?
Twisted kernel just may come this way....
Edit: oh well, I tried
PGW it contains August security patch and sources seem to be out too I think its the latest for G920F, I'd love to see a new kernel tbf, kernel development needs a refresh, wish I had the time and knowledge to do it
I just came to know of this vulnerability.
Unfortunately I have a custom rom in my Galaxy s6.
It is the final one so there are not going to be any updates.
Anyone know how can I patch that vuln?
Thanks
I happen to be exactly in the same situation. Alexis Rom MM user here, didnt want to update to Nougat. If you find a way to patch it please let me know.
As far as I know, only samsung september security patches will fix it. So, a nougat version from september will do. Or if any carrier release a 6.0 september version, but thats probably not possible anymore.
zapahacks said:
I happen to be exactly in the same situation. Alexis Rom MM user here, didnt want to update to Nougat. If you find a way to patch it please let me know.
As far as I know, only samsung september security patches will fix it. So, a nougat version from september will do. Or if any carrier release a 6.0 september version, but thats probably not possible anymore.
Click to expand...
Click to collapse
Hopefully someone will make a patch , like @Tungstwenty made for those master key vulnerabilities.
Anyways i shall post if something comes to my notice.
Same interest - 6.0 MM stock rom on Moto X 2014. Hoping that some kind of universal patch can be made to at-least fix part of the vulnerability. I have a wearable so disabling bluetooth is not feasible. However using a device that's wide open is not going to work. Don't really want to upgrade since there's no worthy spiritual successor to this phone.
I received my New Poco X3 Pro, waited 1 Week for unlock and flashed Arrow OS 11.
I did not install a Xiaomi ROM because I want a Custom ROM on there.
Do I need to update the firmware (or radio or baseband)?
How do I find out what firmware is currently on my phone?
Based on this site, the latest firmware would be V12.5.4.0.RJUEUXM.
Xiaomi Firmware Updater
The ultimate script that provides firmware packages for Xiaomi devices.
xiaomifirmwareupdater.com
However, I do not find any clue about the baseband on my phone.
In Settings-about-Android version the baseband is listed but there is no version number close to V12...
How do I get the current firmware version and do I need to update it?
You have to decide wether to work with stock firmware or custom rom (firmware)... the stock is provided often in "waves" so it could be that you receive a new firmware over ota, but a friend with the same device will gett it 3 weeks later. with stock firmware you get some updates, but with custom nobody guarantees you new versions. I´m very happy with AICP 16.1, which distributes a new Rom Version every Friday... Tomorrow i will get a new version with regularyly smaller bug fixings. My version is from 4th of february ... i never updated radio or baseband with all my devices, normally you dont need to, its in the custom roms
I am talking about firmware, not the ROM.
The firmware/radio is updated separately.
since more than 20 years of mobiles i have never got a seperate(!) radio update (but i flashed different radio versions to adapt custom roms (from australia i.e) to local conditions). Afaik stock firmware made by manufacturer, adapted to the given hardware and build on the differnt Android versions. Custom Roms are the same but made not by manufacturer but by "free" developers. If it is not so, it would be nice to hear how it is in reality....
The Pixel Experience ROM contains this firmware images for radio or need to be update separately?
andris155 said:
The Pixel Experience ROM contains this firmware images for radio or need to be update separately?
Click to expand...
Click to collapse
You don't need to flash firmware because any of them should work. I flash many rom but haven't flash any firmware.
In an ideal world, the latest firmware should ideally provide performance optimization or bug fixes or securities updates or new features etc.
Of course, unlike drivers, they not obligated to keep us in loop what the update is about.
Lu5ck said:
In an ideal world, the latest firmware should ideally provide performance optimization or bug fixes or securities updates or new features etc.
Of course, unlike drivers, they not obligated to keep us in loop what the update is about.
Click to expand...
Click to collapse
performance opitmization , bug fix and securities update should be include in the rom and kernel. Firmware isn't rom so that should be no need.
Alec Chan said:
performance opitmization , bug fix and securities update should be include in the rom and kernel. Firmware isn't rom so that should be no need.
Click to expand...
Click to collapse
Firmware is an read only system and just like any system it has purposes which this case it provide instructions on how to communicate with the hardware. Just like any piece of codings, it can contain bugs or exploits or unoptimized codings like looping 10 times to do one thing.
Just wondering, (I know a long shot) if anyone happen to find an exploit for root shell yet? Maybe even a poc exploit? Magisk able preferably. Yes root with bootloader locked. Been done on other phones, Xperia, lg v20 etc. Garbage how we are locked down. Even a full root with bootloader v6 (forced current) would be even better. I have only seen for v1. Tmobile snapdragon usa btw.
theres a new exploit 'dirtycred'! theres some good info here on it and WORKING ANDROID CODE (unreleased for now):
https://twitter.com/i/web/status/1544379506659663872
it appears like older kernels wont work with the exploit according to one of the devs.
I'm thinking to update my a71 5g phone with the latest one UI 4.1 update, but unsure of the kernel version included??
Can anyone please post what kernel versions come in the a71 5g updates? or, link me where i can find this? in all the update documentation, i dont see any kernel version info
also, i see there IS a "dirty pipe" (not dirtycred) exploit fix in the latest updates. i am unsure if this will also fix dirtycred or not, though i dont think it will
ballgum said:
theres a new exploit 'dirtycred'! theres some good info here on it and WORKING ANDROID CODE (unreleased for now):
https://twitter.com/i/web/status/1544379506659663872
it appears like older kernels wont work with the exploit according to one of the devs.
I'm thinking to update my a71 5g phone with the latest one UI 4.1 update, but unsure of the kernel version included??
Can anyone please post what kernel versions come in the a71 5g updates? or, link me where i can find this? in all the update documentation, i dont see any kernel version info
also, i see there IS a "dirty pipe" (not dirtycred) exploit fix in the latest updates. i am unsure if this will also fix dirtycred or not, though i dont think it will
Click to expand...
Click to collapse
I tried looking into dirtypipe but couldn't find much. Also wasn't sure if it would work for this A71 5g (Snapdragon). I personally haven't updated in a while so I am currently on kernel 4.19 UI 3.1 (date ASPL 11/1/21). This seems interesting non the less. Wonder what all is needed/how to do other then video. In case you are trying to find your version, it's under settings-then about phone-then software information.
So I just check another A71 5g Snapdragon that's has newest update and it's still 4.19
Mysticblaze347 said:
So I just check another A71 5g Snapdragon that's has newest update and it's still 4.19
Click to expand...
Click to collapse
damn! that sucks!! that means we wont be able to use these expoits i dont think. dirtypipe and dirtycred dont work on 4.19 i dont believe. i checked the source code for pipe, and it says at least 5.8 i think it was
Mysticblaze347 said:
So I just check another A71 5g Snapdragon that's has newest update and it's still 4.19
Click to expand...
Click to collapse
so you have a different a71 that is the most up to date on android 12? and android 12 still uses 4.19? ugh
you would think they would've included a kernel update in the OS updates from android 11 -> 12
guess not
Yeah, I checked my gf's cause hers forced updates to current, mine I paused an update awhile ago so it's locked until I unpause it. Phones now adays are just insane with lockdown. You would think it would have updated kernel as well, but maybe something for 4.19 will show...hopefully.
ballgum said:
so you have a different a71 that is the most up to date on android 12? and android 12 still uses 4.19? ugh
you would think they would've included a kernel update in the OS updates from android 11 -> 12
guess not
Click to expand...
Click to collapse
I wonder if any of these may be possible. 2021 I did see 4.19 ... https://github.com/bcoles/kernel-exploits
So the 2019 might be better for 4.19... https://github.com/bcoles/kernel-exploits/blob/master/CVE-2019-13272/poc.c