Magisk Canary Update
2024-08-23
#MagiskCanary
Build version:
Changelog:
https://github.com/topjohnwu/Magisk/releases/download/canary-27007/notes.md
Download:
app-release.apk
2024-08-23
#MagiskCanary
Build version:
27007
Changelog:
https://github.com/topjohnwu/Magisk/releases/download/canary-27007/notes.md
Download:
app-release.apk
以下全是我对Magisk静默获取root权限漏洞的错误猜测,可以不看。
The following text is all my wrong guesses about the vulnerability of Magisk silently obtaining root permissions. You don’t need to read it.
关于昨天就开始传播的Magisk静默获取root权限漏洞视频,我认为不必过分惊慌。
首先,漏洞发现者表示该漏洞只能在部分设备上利用,其次,在演示视频中,演示用机为红米5 Plus(代号为vince,Soc为骁龙625),内核版本为3.18(等我调查清楚... 出厂内核版本为3.18,可更新至4.9,不过考虑到3.18不支持eBPF很难上Android 12,因此猜测视频中rom使用的内核为4.9),Android版本为12(但视频中没有展示Android安全补丁版本),因此有理由猜测该漏洞只能在比较旧的设备上触发。
因此,我建议各位始终坚持使用最新版本的rom(无论是官方还是非官方)以确保设备系统安全。
Regarding the video of Magisk silently obtaining root permissions that started to spread yesterday, I don't think there is any need to panic.
First, the vulnerability discoverer said that the vulnerability can only be exploited on some devices. Secondly, in the demonstration video, the demonstration device is Redmi 5 Plus (codenamed vince, Soc is Snapdragon 625),the kernel version is 3.18 (I'll confirm after I investigate... the factory kernel version is 3.18, which can be updated to 4.9. However, considering that the 3.18 kernel does not support eBPF and it is difficult to update to Android 12, it is speculated that the kernel used by the rom in the video is 4.9), and the Android version is 12 (but the Android security patch version is not shown in the video), so it is reasonable to guess that the vulnerability can only be triggered on older devices.
Therefore, I suggest that you always use the latest version of ROM (whether official or unofficial) to ensure the security of the system.
The following text is all my wrong guesses about the vulnerability of Magisk silently obtaining root permissions. You don’t need to read it.
关于昨天就开始传播的Magisk静默获取root权限漏洞视频,我认为不必过分惊慌。
首先,漏洞发现者表示该漏洞只能在部分设备上利用,其次,在演示视频中,演示用机为红米5 Plus(代号为vince,Soc为骁龙625),
因此,我建议各位始终坚持使用最新版本的rom(无论是官方还是非官方)以确保设备系统安全。
Regarding the video of Magisk silently obtaining root permissions that started to spread yesterday, I don't think there is any need to panic.
First, the vulnerability discoverer said that the vulnerability can only be exploited on some devices. Secondly, in the demonstration video, the demonstration device is Redmi 5 Plus (codenamed vince, Soc is Snapdragon 625),
Therefore, I suggest that you always use the latest version of ROM (whether official or unofficial) to ensure the security of the system.
Pzqqt's News Channel
Magisk Canary Update 2024-08-23 #MagiskCanary Build version: 27007 Changelog: https://github.com/topjohnwu/Magisk/releases/download/canary-27007/notes.md Download: app-release.apk
One more thing, judging from the changelog, 27007 does not seem to fix that vulnerability.
Pzqqt's News Channel
再补充一点,从更新日志来看,27007似乎并没有修复此漏洞。 One more thing, judging from the changelog, 27007 does not seem to fix that vulnerability.
https://github.com/topjohnwu/Magisk/issues/8330#issuecomment-2305742145
破案了。27007已修复此漏洞。
简单来说,此漏洞只会影响那些没有预装GMS的rom。
Okay. 27007 has fixed this vulnerability.
Simply put, this vulnerability only affects those ROMs that do not have GMS pre-installed.
破案了。27007已修复此漏洞。
简单来说,此漏洞只会影响那些没有预装GMS的rom。
Okay. 27007 has fixed this vulnerability.
Simply put, this vulnerability only affects those ROMs that do not have GMS pre-installed.
GitHub
Security vulnerability · Issue #8330 · topjohnwu/Magisk
screen-20220302-093745.1.mp4 https://t.me/CanyieChannel/229 Device:None Android version:None Magisk version name:None Magisk version code:27006
New CodeLinaro OSS Vendor tag for Parrot found:
LA.VENDOR.1.0.r2-12600-WAIPIO.QSSI14.0
LA.VENDOR.1.0.r2-12600-WAIPIO.QSSI14.0
GitLab
LA.VENDOR.1.0.r2-12600-WAIPIO.QSSI14.0 · Tags · CodeLinaro / la / la / vendor / manifest · GitLab
Pzqqt's News Channel
https://github.com/topjohnwu/Magisk/issues/8330#issuecomment-2305742145 破案了。27007已修复此漏洞。 简单来说,此漏洞只会影响那些没有预装GMS的rom。 Okay. 27007 has fixed this vulnerability. Simply put, this vulnerability only affects those ROMs that do not have GMS pre-installed.
用简单易懂的话来解释一下这个漏洞的原理:
Magisk在检测到设备已安装GMS的情况下,会尝试调用
所以,攻击者可以伪造一个包名为
Magisk的修复方式也很简单:在尝试调用GMS的方法之前,先确保com.google.android.gms是系统应用。
因此,该漏洞不影响已预装了GMS的rom。
首先,攻击者伪造的恶意apk很难成为系统应用。其次,对于已预装了GMS的rom,即便是用户主动安装该恶意apk,因为攻击者伪造的
综上所述,我有以下几点建议:
1. 介于该漏洞的利用方式已完全公布,因此请Magisk用户立即更新到27007版本;
2. 谨慎使用核心破解模块,你可以在确实需要时暂时启用该模块,但在日常使用时务必禁用;
3. 永远记住,谨慎安装未知来源的apk。
Let me explain the principle of this vulnerability in simple and easy-to-understand words:
When Magisk detects that GMS is installed, it will try to call a method of
Therefore, an attacker can forge an apk with the package name
The fix for Magisk is also very simple: before trying to call the GMS method, make sure that com.google.android.gms is a system app.
Therefore, this vulnerability does not affect ROMs pre-installed with GMS.
First, it's difficult for the malicious apk forged by the attacker to become a system app. Secondly, For ROMs pre-installed with GMS, even if the user actively installs the malicious apk, because the signature of the
In summary, I have the following suggestions:
1. Since the exploit method of this vulnerability has been fully disclosed, for Magisk users, please update to version 27007 immediately;
2. Use the core cracking module with caution. You can temporarily enable the module when you really need it, but be sure to disable it in daily use;
3. Always remember to install apks from unknown sources with caution.
Magisk在检测到设备已安装GMS的情况下,会尝试调用
com.google.android.gms
(即Google Play服务)的某个方法,并且是以root权限调用的。所以,攻击者可以伪造一个包名为
com.google.android.gms
的apk,并且实现Magisk需要调用的方法,然后Magisk就会以root权限执行攻击者编写的方法。Magisk的修复方式也很简单:在尝试调用GMS的方法之前,先确保com.google.android.gms是系统应用。
因此,该漏洞不影响已预装了GMS的rom。
首先,攻击者伪造的恶意apk很难成为系统应用。其次,对于已预装了GMS的rom,即便是用户主动安装该恶意apk,因为攻击者伪造的
com.google.android.gms
apk签名肯定是与Google的签名不同的,所以肯定不会安装成功,漏洞自然也无法被利用,除非用户手贱用核心破解模块绕过了apk签名认证。综上所述,我有以下几点建议:
1. 介于该漏洞的利用方式已完全公布,因此请Magisk用户立即更新到27007版本;
2. 谨慎使用核心破解模块,你可以在确实需要时暂时启用该模块,但在日常使用时务必禁用;
3. 永远记住,谨慎安装未知来源的apk。
Let me explain the principle of this vulnerability in simple and easy-to-understand words:
When Magisk detects that GMS is installed, it will try to call a method of
com.google.android.gms
(i.e. Google Play Services), and call it with root privileges.Therefore, an attacker can forge an apk with the package name
com.google.android.gms
and implement the method that Magisk needs to call, and then Magisk will execute the method written by the attacker with root privileges.The fix for Magisk is also very simple: before trying to call the GMS method, make sure that com.google.android.gms is a system app.
Therefore, this vulnerability does not affect ROMs pre-installed with GMS.
First, it's difficult for the malicious apk forged by the attacker to become a system app. Secondly, For ROMs pre-installed with GMS, even if the user actively installs the malicious apk, because the signature of the
com.google.android.gms
apk forged by the attacker is definitely different from that of Google, it will definitely not be installed successfully, and the vulnerability cannot be exploited, unless the user uses the core cracking module to bypass the apk signature authentication.In summary, I have the following suggestions:
1. Since the exploit method of this vulnerability has been fully disclosed, for Magisk users, please update to version 27007 immediately;
2. Use the core cracking module with caution. You can temporarily enable the module when you really need it, but be sure to disable it in daily use;
3. Always remember to install apks from unknown sources with caution.
Linux 6.11-rc5 Released With Slimmed Down Set Of Bcachefs Fixes
25 August 2024 - Linux 6.11-rc5
The Linux 6.11-rc5 kernel is already out as stable today, roughly a half-day ahead of time due to travels by Linus Torvalds.
Comments
#Phoronix #LinuxKernel
25 August 2024 - Linux 6.11-rc5
The Linux 6.11-rc5 kernel is already out as stable today, roughly a half-day ahead of time due to travels by Linus Torvalds.
Comments
#Phoronix #LinuxKernel
Pzqqt's News Channel
Melt Kernel v3.0 for marble/marblein By @pzqqt Download Source XDA Changelog & Note: - Too long, see here. About KernelSU: - Select through the volume keys during the installation process to install the kernel that supports KernelSU. - If the installer…
对于感觉Melt Kernel比较耗电的用户,试试在安装过程中选择禁用“DAMON-based Reclamation”。
目前Melt Kernel预设的DAMON-based Reclamation相关参数有些不合理,会导致kdamond长时间保持活跃,从而消耗较多的电量。在之后的版本中我会进行优化调整。
For users who feel that Melt Kernel consumes too much power, try disabling "DAMON-based Reclamation" during the installation process.
The default DAMON-based Reclamation parameters of Melt Kernel are not appropriate, which will cause kdamond to remain active for a long time, thus consuming more power. I will make optimization adjustments in the next version.
目前Melt Kernel预设的DAMON-based Reclamation相关参数有些不合理,会导致kdamond长时间保持活跃,从而消耗较多的电量。在之后的版本中我会进行优化调整。
For users who feel that Melt Kernel consumes too much power, try disabling "DAMON-based Reclamation" during the installation process.
The default DAMON-based Reclamation parameters of Melt Kernel are not appropriate, which will cause kdamond to remain active for a long time, thus consuming more power. I will make optimization adjustments in the next version.
Beyond Compare 5 Update
2024-08-28
#BeyondCompare5
Changelog:
https://www.scootersoftware.com/download/v5changelog
Download:
5.0.2, build 30045
2024-08-28
#BeyondCompare5
Changelog:
https://www.scootersoftware.com/download/v5changelog
Download:
5.0.2, build 30045
Scootersoftware
Scooter Software - Home of Beyond Compare
Scooter Software: Home of Beyond Compare
New CodeLinaro OSS Vendor tag for Parrot found:
LA.VENDOR.1.0.r2-12700-WAIPIO.QSSI15.0
LA.VENDOR.1.0.r2-12700-WAIPIO.QSSI15.0
GitLab
LA.VENDOR.1.0.r2-12700-WAIPIO.QSSI15.0 · Tags · CodeLinaro / la / la / vendor / manifest · GitLab
One Of The Rust Linux Kernel Maintainers Steps Down - Cites "Nontechnical Nonsense"
29 August 2024 - Rust For Linux Resignation
One of the several Rust for Linux kernel maintainers has decided to step away from the project. The move is being driven at least in part due to having to deal with increased "nontechnical nonsense" raised around Rust programming language use within the Linux kernel.
Comments
#Phoronix #LinuxKernel
29 August 2024 - Rust For Linux Resignation
One of the several Rust for Linux kernel maintainers has decided to step away from the project. The move is being driven at least in part due to having to deal with increased "nontechnical nonsense" raised around Rust programming language use within the Linux kernel.
Comments
#Phoronix #LinuxKernel
Linux 6.12 To Optionally Display A QR Code During Kernel Panics
29 August 2024 - DRM Panic Handler QR Codes
Submitted today via DRM-Misc-Next to DRM-Next for staging ahead of the Linux 6.12 merge window in mid-September is optional support for displaying a QR code within the DRM Panic handler infrastructure when a Linux kernel panic occurs.
Comments
#Phoronix #LinuxKernel
29 August 2024 - DRM Panic Handler QR Codes
Submitted today via DRM-Misc-Next to DRM-Next for staging ahead of the Linux 6.12 merge window in mid-September is optional support for displaying a QR code within the DRM Panic handler infrastructure when a Linux kernel panic occurs.
Comments
#Phoronix #LinuxKernel
今天下午更新
1. Chrome闪退;
2. 其他app打开webview界面(比如:微信的“订阅号”)后闪退。
排除了内核、Magisk模块、Zygisk模块的影响后,初步怀疑是系统webview内核的问题。
打开
接下来开始解决问题。
首先解决问题2:卸载Chrome,这样app就会强制使用Android System WebView。
然后解决问题1:试着从Play商店重新安装Chrome,问题依旧。于是从APKMirror下载最新的Chrome apk,安装后问题解决。之后仍然可以从Play商店更新Chrome。
HyperOS.eu
到1.0.6.0.UMRCNXM
,更新之后发现了一些问题:1. Chrome闪退;
2. 其他app打开webview界面(比如:微信的“订阅号”)后闪退。
排除了内核、Magisk模块、Zygisk模块的影响后,初步怀疑是系统webview内核的问题。
打开
设置 -> 更多设置 -> 开发者选项 -> WebView 实现
,发现可选的WebView实现只有一个Android System WebView,版本号为127.0.6533.103
。但在我的印象中,如果已经安装了Chrome的话,这里可选的WebView实现应该只有一个Chrome才对。接下来开始解决问题。
首先解决问题2:卸载Chrome,这样app就会强制使用Android System WebView。
然后解决问题1:试着从Play商店重新安装Chrome,问题依旧。于是从APKMirror下载最新的Chrome apk,安装后问题解决。之后仍然可以从Play商店更新Chrome。
Rust Linux Developers Compared To Road Builders & Mapmakers
30 August 2024 - Airlie Comparison
Longtime Direct Rendering Manager (DRM) subsystem maintainer David Airlie of Red Hat has written an interesting blog post providing an analogy to types of developers compared to road builders and hotels.
Comments
#Phoronix #LinuxKernel
30 August 2024 - Airlie Comparison
Longtime Direct Rendering Manager (DRM) subsystem maintainer David Airlie of Red Hat has written an interesting blog post providing an analogy to types of developers compared to road builders and hotels.
Comments
#Phoronix #LinuxKernel
Melt-opensource-msm_drm-fe2453f3c2bd-HOS.zip
8.9 MB
SHA1:
8C317FB564B2267519CC0A7EDC7247F23FE609A2
Pzqqt's News Channel
Melt-opensource-msm_drm-fe2453f3c2bd-HOS.zip
What's this?
This package will replace your device's display driver (
Compared with the official precompiled display driver, this new driver has the following advantages:
1. Completely disabled logspam.
2. The baseline version is newer (
Where is the source code?
Here
How to install it?
Install it like you installed the kernel. You can install it in TWRP or in some apps (eg: Kernel Flasher)
Are there any known bugs?:
I haven't found any yet. Please try.
Btw, the AOD bug previously encountered on HyperOS has been fixed.
Which roms can install it?
- Official HyperOS rom (or some modified HyperOS roms without much modification, such as:
- AOSP roms based on HyperOS official precompiled kernel modules.
- If you have already installed Melt Kernel, you can also install it.
Note:
- If you are using MIUI14 rom, or old AOSP rom based on MIUI14 firmware, you should NOT install it. Generally speaking, your installation will fail.
- Do NOT install it on an AOSP rom based on the LineageOS team's OSS kernel, unless you have already installed the latest version of Melt Kernel, otherwise you will definitely encounter boot failures.
This package will replace your device's display driver (
msm_drm.ko
) with the open source build.Compared with the official precompiled display driver, this new driver has the following advantages:
1. Completely disabled logspam.
2. The baseline version is newer (
DISPLAY.LA.2.0.r1-13200-WAIPIO.0
). This usually brings some performance improvements and bug fixes.Where is the source code?
Here
How to install it?
Install it like you installed the kernel. You can install it in TWRP or in some apps (eg: Kernel Flasher)
Are there any known bugs?:
I haven't found any yet. Please try.
Btw, the AOD bug previously encountered on HyperOS has been fixed.
Which roms can install it?
- Official HyperOS rom (or some modified HyperOS roms without much modification, such as:
HyperOS.eu
).- AOSP roms based on HyperOS official precompiled kernel modules.
- If you have already installed Melt Kernel, you can also install it.
Note:
- If you are using MIUI14 rom, or old AOSP rom based on MIUI14 firmware, you should NOT install it. Generally speaking, your installation will fail.
- Do NOT install it on an AOSP rom based on the LineageOS team's OSS kernel, unless you have already installed the latest version of Melt Kernel, otherwise you will definitely encounter boot failures.
GitHub
GitHub - Pzqqt/android_kernel_xiaomi_marble at fe2453f3c2bda6ca6a2d03fa166b6f24c056f121
Melt Kernel For Redmi Note 12 Turbo (marble) / Poco F5 (marblein) - GitHub - Pzqqt/android_kernel_xiaomi_marble at fe2453f3c2bda6ca6a2d03fa166b6f24c056f121
Linux 6.11-rc6 Released With More Bcachefs Fixes & Other Kernel Fixes
1 September 2024 - Linux 6.11-rc6
Like with last week's Linux 6.11-rc5 release, Linux 6.11-rc6 is out a half-day early due to Linus Torvalds' ongoing foreign travels. Linux 6.11-rc6 brings many more fixes to this kernel that will debut as stable in mid-September,
Comments
#Phoronix #LinuxKernel
1 September 2024 - Linux 6.11-rc6
Like with last week's Linux 6.11-rc5 release, Linux 6.11-rc6 is out a half-day early due to Linus Torvalds' ongoing foreign travels. Linux 6.11-rc6 brings many more fixes to this kernel that will debut as stable in mid-September,
Comments
#Phoronix #LinuxKernel
Pzqqt's News Channel
今天下午更新HyperOS.eu到1.0.6.0.UMRCNXM,更新之后发现了一些问题: 1. Chrome闪退; 2. 其他app打开webview界面(比如:微信的“订阅号”)后闪退。 排除了内核、Magisk模块、Zygisk模块的影响后,初步怀疑是系统webview内核的问题。 打开设置 -> 更多设置 -> 开发者选项 -> WebView 实现,发现可选的WebView实现只有一个Android System WebView,版本号为127.0.6533.103。但在我的印象中,如果已经安装…
后续:
如果仍然遇到微信某些界面闪退的问题,尝试删除以下目录,并立即重启:
如果仍然遇到微信某些界面闪退的问题,尝试删除以下目录,并立即重启:
/data/dalvik-cache
/data/system/package_cache
/data/misc/apexdata/com.android.art/dalvik-cache
/data/data/com.tencent.mm/app_xweb_data/xweb_1160117/apk/oat
Pzqqt's News Channel
Melt Kernel v3.0 for marble/marblein By @pzqqt Download Source XDA Changelog & Note: - Too long, see here. About KernelSU: - Select through the volume keys during the installation process to install the kernel that supports KernelSU. - If the installer…
下个版本Melt Kernel的新特性预告:
相信绝大多数用户都会把右手大拇指的指纹录入到系统。当你走在路上想要关闭手机屏幕并把它塞到裤兜里时,可能会用右手大拇指去按下电源键,但是在关闭屏幕的瞬间很有可能会因为指纹唤醒而导致设备屏幕被重新点亮,然后你的手机就会在你的裤兜里尽情误触。
下个版本的Melt Kernel将在用户空间创建一个新的节点,写入这个节点可使得你的手机的指纹传感器在屏幕关闭后失效若干秒,从而避免误触问题。
New features of the next version of Melt Kernel:
I believe that most users will register the fingerprint of their right thumb into the system. When you walk on the street and want to turn off the screen of your phone and put it in your pocket, you may use your right thumb to press the power button. However, at the moment of turning off the screen, it is very likely that the device screen will be re-lit due to fingerprint wake-up, and then an accidental touch will occur.
The next version of Melt Kernel will create a new node in the user space. Writing to this node can make your phone's fingerprint sensor invalid for several seconds after the screen is turned off, thereby avoiding the problem of accidental touches.
相信绝大多数用户都会把右手大拇指的指纹录入到系统。当你走在路上想要关闭手机屏幕并把它塞到裤兜里时,可能会用右手大拇指去按下电源键,但是在关闭屏幕的瞬间很有可能会因为指纹唤醒而导致设备屏幕被重新点亮,然后你的手机就会在你的裤兜里尽情误触。
下个版本的Melt Kernel将在用户空间创建一个新的节点,写入这个节点可使得你的手机的指纹传感器在屏幕关闭后失效若干秒,从而避免误触问题。
New features of the next version of Melt Kernel:
I believe that most users will register the fingerprint of their right thumb into the system. When you walk on the street and want to turn off the screen of your phone and put it in your pocket, you may use your right thumb to press the power button. However, at the moment of turning off the screen, it is very likely that the device screen will be re-lit due to fingerprint wake-up, and then an accidental touch will occur.
The next version of Melt Kernel will create a new node in the user space. Writing to this node can make your phone's fingerprint sensor invalid for several seconds after the screen is turned off, thereby avoiding the problem of accidental touches.