Root Marshmallow with new Android exploit? - LG V10 Q&A, Help & Troubleshooting

Surely the Dirty Cow privilege escalation should work, and not just on the V10. Tungkick...?
http://arstechnica.com/security/201...-escalation-bug-ever-is-under-active-exploit/
https://www.youtube.com/watch?v=1scGZDYsMAU

shizat63 said:
Surely the Dirty Cow privilege escalation should work, and not just on the V10. Tungkick...?
http://arstechnica.com/security/201...-escalation-bug-ever-is-under-active-exploit/
https://www.youtube.com/watch?v=1scGZDYsMAU
Click to expand...
Click to collapse
I think we may need to do this by ourselves. It seems that no dev is using V10 now
I will try to take a look on these discussion to see whether i can root V10 with this exploit

More info
http://arstechnica.com/security/201...ed-by-most-serious-linux-escalation-bug-ever/

Too few ppl can make tot, because they don't wanna release tutorial.

Related

The LG G2, ROOT and you...

A brief history of KitKat and ROOT
Nexus devices and all other devices with unlockable bootloaders have root, because those devices can have custom recoveries and flashing superuser.zip is possible.
The Moto X has root on 4.4 because 4.2.2 was rootable and JCase figured out how to keep that exploit through an OTA to 4.4. This method is broken on 4.4.2 rolling out now.
The G2 has root on 4.2 AND a work around the locked bootloader with LOKI.
It was discovered that you could keep root on 4.4.2 on the G2 by using the 4.2.2 bootloader AND a custom kernel. The stock kitkat kernel will NOT boot unless the 4.4.2 bootloader is present. G2 variants with released kernel sources have root thanks to this discovery.
The method involves rooting 4.2.2, using the loki exploit to install recovery, then flashing the rooted 4.4.2 stock rom FOR YOUR VARIANT.
As soon as source code is released by LG for your variant, a custom kernel which will work with the 4.2.2 bootloader can be built.
This is where we are today.
KitKat has been out for several months and an exploit for root has not been found.
Edit....
Autoprime has rooted KitKat. Ioroot works.
Any word yet for the d801 from T-Mobile?
Do you know if SuperSU would be able to retain root w/ the 4.4.2 OTA and Survival mode enabled?
redduc900 said:
Do you know if SuperSU would be able to retain root w/ the 4.4.2 OTA and Survival mode enabled?
Click to expand...
Click to collapse
I believe I am right in saying that it can but it's uses will be very limited as you will be unable to flash a custom recovery. Depends what you require from your rooted device.
SuperSU survival mode didn't work from JB to KK via OTA, for what it's worth. I just want to run a couple of root apps + xposed, so it would have been ideal.
Didn't survive root for me either. T-Mobile D801.
You said that after several months an exploit for root has nor been found.
So should we expect a solution and nor a workaround for the bootloader in one month or more?
Or should we expect to not see a solution at all?
The point of my thread is to say where we are. There is no way to speculate about when/if root gets found for kitkat.
gunnyman said:
The point of my thread is to say where we are. There is no way to speculate about when/if root gets found for kitkat.
Click to expand...
Click to collapse
I understand so for the moment we have nothing !
I just saw an article in android news on flipboard that chainfire has already rooted the galaxy s5 and its not even out yet.
Hopefully we can get something soon.
Sent from my LG-D801 using xda app-developers app
Samsung must not have patched the Odin exploit. Chainfire's Samsung roots involve flashing a rooted image if I recall.
This rather sucks, as I got another G2 and it came with 4.4.2 already installed. I think I'm screwed until an actual exploit comes along. I want my root, but not enough to downgrade > upgrade > potentially find out it didn't survive. Bleh. And who knows, they might even have patched the bootloader for all I know.
Having said all that, where might one find a JB image for a D800?
JellyBean ROM to regain root on G2
voxluna said:
Having said all that, where might one find a JB image for a D800?
Click to expand...
Click to collapse
To answer my own question... there's a thread here that describes going back to JellyBean, with links to several other threads with additional options, such as mixed firmware and other things.
FWIW, I want to revert to JB for two reasons. One, I don't see a great deal of improvement with KK (for my purposes at least). Second, of course, is to have root -- primarily so I can block ads without having to run Spotflux.
Of course, flashing a ROM backwards like this necessitates wiping the phone, which is a pain in the ass I'm not sure I need right now. It would be a lot better to just have root for KitKat, obviously.
voxluna said:
This rather sucks, as I got another G2 and it came with 4.4.2 already installed. I think I'm screwed until an actual exploit comes along. I want my root, but not enough to downgrade > upgrade > potentially find out it didn't survive. Bleh. And who knows, they might even have patched the bootloader for all I know.
Having said all that, where might one find a JB image for a D800?
Click to expand...
Click to collapse
An exploit has been found, and it works fine on the D800 4 4.2 as tested by me. I now have root. Just follow this link, it called IOROOT25: http://forum.xda-developers.com/showthread.php?p=51506801
Sent from my LG-D800 using xda app-developers app

Root for android L?

I have no clue how people figure out how to root and unlock bootloaders I'm just one of the lucky guys that get to use the programs that are made to let us be able to do the great stuff we can with android. But since that guy opened sourced bump do you guys think we will ever get stock android L rooted since now maybe LG will be able to patch the root and bump methods or will we be stuck on 4.4?
timmyd463229 said:
I have no clue how people figure out how to root and unlock bootloaders I'm just one of the lucky guys that get to use the programs that are made to let us be able to do the great stuff we can with android. But since that guy opened sourced bump do you guys think we will ever get stock android L rooted since now maybe LG will be able to patch the root and bump methods or will we be stuck on 4.4?
Click to expand...
Click to collapse
We aren't going to be stuck on 4.4 either way. If they patch it, someone will eventually release a version that doesn't contain the patch and can be flashed via twrp. Just don't take any OTA updates, otherwise you may lose root forever.
bpyazel said:
We aren't going to be stuck on 4.4 either way. If they patch it, someone will eventually release a version that doesn't contain the patch and can be flashed via twrp. Just don't take any OTA updates, otherwise you may lose root forever.
Click to expand...
Click to collapse
Ok sounds good to me
sent from my stumped and bumped g3

Stump root = already rooted fall

Any one going to get this to work with the new update, it was so incredibly easy to do I'm spoiled.. I'd like to stay stock but rooted for WiFi tethering. Easiest way?
Gonna be a while... OTA hasn't even hit Sprint yet... If u don't wanna wait then flash barren rom. If u flashed the zv6 file then u are stuck until someone sidesteps Google and LG security patches that block root.
vincey2kr1 said:
Any one going to get this to work with the new update, it was so incredibly easy to do I'm spoiled.. I'd like to stay stock but rooted for WiFi tethering. Easiest way?
Click to expand...
Click to collapse
ZV6 has patched the vulnerability that Stump exploited. No way to know if anyone will find a way to root ZV6. If you want ZV6 and root, you'll need to be rooted on ZV4, flash bumped TWRP, and then flash ZV6 (see link below). If you really want the stock recovery, you can flash that after flashing ZV6. It's around here somewhere.
http://forum.xda-developers.com/sprint-lg-g3/general/zv6-update-accept-info-fixes-t2959461
This is already discussed here, including the notes I got back from the team who brought us Stump:
http://forum.xda-developers.com/sprint-lg-g3/general/fyi-stump-root-bump-ls990zv6-t2947945
I would not ask for an ETA.
Bottom line: We have root, you just have some work to keep it.
Bashing palm on forehead
I really hope that the Stump team can find a way around this new update.
Miss my root badly......:crying:
Damitu said:
Bashing palm on forehead
I really hope that the Stump team can find a way around this new update.
Miss my root badly......:crying:
Click to expand...
Click to collapse
You can downgrade to the ZV4 ROM, which is rootable, using LG's tools. You'll be starting with a clean phone, and have to redo all your apps and settings, but at least you'll be able to root again.
Anyone try purple drake yet to root yet?
Zv6 what changes were made besides removing root
kennwoodkenn said:
Zv6 what changes were made besides removing root
Click to expand...
Click to collapse
Google Security Patches
Qualcomm Security Patch
International Voice over WiFi
Improve unlock algorithm when phone is in the pocket
Enhancements to the LG Home (Sluggish UI fix)
Enhancement to the compass application
Enhancement to the Auxiliary cable recognition
Added Mobolize
https://community.sprint.com/baw/thread/179578

Worth LP upgrade now or wait for OTA?

I've recently switched the G3 but using it on straight talk so root actually helped me get rid of the "unknown sim" icon. It looks like theres no root for Lollipop yet so im wondering if it would be worth upgrading to lollipop now or waiting for OTA and hoping root is figured out by then
aford89 said:
I've recently switched the G3 but using it on straight talk so root actually helped me get rid of the "unknown sim" icon. It looks like theres no root for Lollipop yet so im wondering if it would be worth upgrading to lollipop now or waiting for OTA and hoping root is figured out by then
Click to expand...
Click to collapse
The OTA that's out is definitely not official. And yes, no root. Not sure if there ever WILL be a root for the official OTA once it comes out since it has to be done by an exploit, and LP has made exploits even harder to find.
I myself am staying on KK. I must have root for Titanium Backup. That's basically all I have root for and without it, I cannot restore my app settings, so until a root exploit is found for the official OTA (once it comes out), then I'll go to Lollipop possibly. But even with the current unofficial OTA, there are various issues with LP.
Might want to wait until 5.1 (if we ever get it for the G3) comes out as 5.0.1 still have a major memory leak in it.
iBolski said:
The OTA that's out is definitely not official. And yes, no root. Not sure if there ever WILL be a root for the official OTA once it comes out since it has to be done by an exploit, and LP has made exploits even harder to find.
I myself am staying on KK. I must have root for Titanium Backup. That's basically all I have root for and without it, I cannot restore my app settings, so until a root exploit is found for the official OTA (once it comes out), then I'll go to Lollipop possibly. But even with the current unofficial OTA, there are various issues with LP.
Might want to wait until 5.1 (if we ever get it for the G3) comes out as 5.0.1 still have a major memory leak in it.
Click to expand...
Click to collapse
Root is out for 5.01 23b
92slammer said:
Root is out for 5.01 23b
Click to expand...
Click to collapse
Yup. Just saw that. That's good, but maybe not that good. How much you want to bet that exploit gets patched before the official OTA comes out?
Really wish they would have waited for the official OTA to come out before releasing the exploit.
iBolski said:
Yup. Just saw that. That's good, but maybe not that good. How much you want to bet that exploit gets patched before the official OTA comes out?
Really wish they would have waited for the official OTA to come out before releasing the exploit.
Click to expand...
Click to collapse
thats the hard part...."official" OTA could be next week or it could be in 2 months...never know. Ive been running 23b since it was leaked....runs perfectly on my device...I also rooted it and everything is working fine.
92slammer said:
thats the hard part...."official" OTA could be next week or it could be in 2 months...never know. Ive been running 23b since it was leaked....runs perfectly on my device...I also rooted it and everything is working fine.
Click to expand...
Click to collapse
What about twrp
with the 8 frickin L threads we have now, did we really need another one? and in general not q and a where it belongs....really?
krazy_smokezalot said:
What about twrp
Click to expand...
Click to collapse
no twrp yet...just root...but the devs are working hard on it
92slammer said:
no twrp yet...just root...but the devs are working hard on it
Click to expand...
Click to collapse
btw, i have twrp working.
92slammer said:
no twrp yet...just root...but the devs are working hard on it
Click to expand...
Click to collapse
I know fingers crossed for bumped twrp
bweN diorD said:
btw, i have twrp working.
Click to expand...
Click to collapse
TWRP working on 23B? How?
ohlin5 said:
TWRP working on 23B? How?
Click to expand...
Click to collapse
Magic search the general section and you will find the wand you search. Works great BTW!
aford89 said:
I've recently switched the G3 but using it on straight talk so root actually helped me get rid of the "unknown sim" icon. It looks like theres no root for Lollipop yet so im wondering if it would be worth upgrading to lollipop now or waiting for OTA and hoping root is figured out by then
Click to expand...
Click to collapse
I would wait... All I can say is that there will be a stock/rooted LP ROM very soon.
Xposed won't work with our phones on 5.0. I found that out the hard way. Saw the post in the developer's section that they're still trying to figure it out. Back to KK for me as there's functions of xposed that I need to have. A whole lot of tinkering today and I wound up right back where I was lol

New exploit for linux kernel, new way to root for us?

Hey guys,
I just read about the Dirty Cow vulnerability, that seems to be present in the linux kernel code. I wonder if Samsung has already patched it with the last update that we received. If not, does anyone happen to know, if this would allow us to root our device without tripping KNOX? Because to be completely honest, I didn't read up on KNOX at all until this point, but maybe this would allow us to gain root without having to use CF autoroot and trip KNOX.
If this is the case, I'd gladly try to figure out, how the exploit of that bug works and try to gain root on my device and if I gain root of course share it with you. Or is someone already working on it?
N00BY0815 said:
Hey guys,
I just read about the Dirty Cow vulnerability, that seems to be present in the linux kernel code. I wonder if Samsung has already patched it with the last update that we received. If not, does anyone happen to know, if this would allow us to root our device without tripping KNOX? Because to be completely honest, I didn't read up on KNOX at all until this point, but maybe this would allow us to gain root without having to use CF autoroot and trip KNOX.
If this is the case, I'd gladly try to figure out, how the exploit of that bug works and try to gain root on my device and if I gain root of course share it with you. Or is someone already working on it?
Click to expand...
Click to collapse
good luck hope it works.regards
N00BY0815 said:
Hey guys,
I just read about the Dirty Cow vulnerability, that seems to be present in the linux kernel code. I wonder if Samsung has already patched it with the last update that we received. If not, does anyone happen to know, if this would allow us to root our device without tripping KNOX? Because to be completely honest, I didn't read up on KNOX at all until this point, but maybe this would allow us to gain root without having to use CF autoroot and trip KNOX.
If this is the case, I'd gladly try to figure out, how the exploit of that bug works and try to gain root on my device and if I gain root of course share it with you. Or is someone already working on it?
Click to expand...
Click to collapse
how is it going?
Well there are quite a lot of questions I asked, that noone answered so far. I am still trying to understand, how it works. I already have the code running on my VM and I am testing it on my old Moto G, but to be honest, I don't really know, what it does. If you want to try it yourself, you can get the code here:
https://github.com/timwr/CVE-2016-5195
Check it out yourself. Maybe someone is better at coding than me, because as of now, I am incapable of using the exploit to root our phone. Neither do I know, what happens even if it works.
N00BY0815 said:
Well there are quite a lot of questions I asked, that noone answered so far. I am still trying to understand, how it works. I already have the code running on my VM and I am testing it on my old Moto G, but to be honest, I don't really know, what it does. If you want to try it yourself, you can get the code here:
https://github.com/timwr/CVE-2016-5195
Check it out yourself. Maybe someone is better at coding than me, because as of now, I am incapable of using the exploit to root our phone. Neither do I know, what happens even if it works.
Click to expand...
Click to collapse
sorry i would love to help but i know nothing about coding,but iam sure someone will soon pick up on this .
I am not so sure about this, since not much seems to be going on with this device.
So here is what I found as well:
https://github.com/timwr/CVE-2016-5195/issues/14
In there you can read a little bit and also find precompiled dirtycow as well as cow-exec.
Additionally you'll need the Superuser su binary.
Using those two as described in this discussion, you can actuall get as far as gain root via abd shell. So right now I am: [email protected]_umts:/data/local/tmp #
Which basically means as far as I understand that, that I should have root privileges.
This is on my Moto G, like I said before, since I don't dare touching my 2 months old Galaxy... yet .
So I am currently trying to remount the filesystem, so I can copy the su binary into some folder like /system/xbin, but this doesn't seem to work. Let's see how things go on. Maybe someone want's to join me learning something cool and new
Edit:
Just wanted to leave this here:
https://github.com/jcadduono/androi...mmit/3927c7b98afc02b7b20a42b59d1dfded4b448e31
Seems to be using the same bug, but does something with the recowvery instead. I am just tired, gonne read on tomorrow evening. Have fun ppl
Came here to give you a thumbs up, today i recieved an update from android on my s6 edge. Cancelled it and went to xda emediatly to c if there is any new way to root! I dont know anything about coding so i will be cheering at the sideline.
zwarbo said:
Came here to give you a thumbs up, today i recieved an update from android on my s6 edge. Cancelled it and went to xda emediatly to c if there is any new way to root! I dont know anything about coding so i will be cheering at the sideline.
Click to expand...
Click to collapse
First I'd like to say thanks to you, for being so kind. But I also have to let you know, that I am not a good coder myself. So I'll also have to leave it to the big boys here but as far as I can tell, does this exploit not really help us, as long as selinux is enabled. So we'd have to find a way to set it to permissive, then we'll have a real root exploit. The other way given might work as well (flashing a boot.img using the other exploit) but I don't know if that will trip KNOX or not. So I am also curious as to what's to come.
Sent from my SM-G925F using XDA Free mobile app

Categories

Resources