Pzqqt's News Channel
2.85K subscribers
577 photos
26 videos
403 files
4.26K links
Managed by @pzqqt and @pzqqt_bot

This channel will also push some updates news about things that I'm interested in.
Download Telegram
以下全是我对Magisk静默获取root权限漏洞的错误猜测,可以不看。

The following text is all my wrong guesses about the vulnerability of Magisk silently obtaining root permissions. You don’t need to read it.

关于昨天就开始传播的Magisk静默获取root权限漏洞视频,我认为不必过分惊慌。
首先,漏洞发现者表示该漏洞只能在部分设备上利用,其次,在演示视频中,演示用机为红米5 Plus(代号为vince,Soc为骁龙625),内核版本为3.18等我调查清楚... 出厂内核版本为3.18,可更新至4.9,不过考虑到3.18不支持eBPF很难上Android 12,因此猜测视频中rom使用的内核为4.9),Android版本为12(但视频中没有展示Android安全补丁版本),因此有理由猜测该漏洞只能在比较旧的设备上触发。
因此,我建议各位始终坚持使用最新版本的rom(无论是官方还是非官方)以确保设备系统安全。

Regarding the video of Magisk silently obtaining root permissions that started to spread yesterday, I don't think there is any need to panic.
First, the vulnerability discoverer said that the vulnerability can only be exploited on some devices. Secondly, in the demonstration video, the demonstration device is Redmi 5 Plus (codenamed vince, Soc is Snapdragon 625), the kernel version is 3.18 (I'll confirm after I investigate... the factory kernel version is 3.18, which can be updated to 4.9. However, considering that the 3.18 kernel does not support eBPF and it is difficult to update to Android 12, it is speculated that the kernel used by the rom in the video is 4.9), and the Android version is 12 (but the Android security patch version is not shown in the video), so it is reasonable to guess that the vulnerability can only be triggered on older devices.
Therefore, I suggest that you always use the latest version of ROM (whether official or unofficial) to ensure the security of the system.
Pzqqt's News Channel
Magisk Canary Update 2024-08-23 #MagiskCanary Build version: 27007 Changelog: https://github.com/topjohnwu/Magisk/releases/download/canary-27007/notes.md Download: app-release.apk
再补充一点,从更新日志来看,27007似乎并没有修复此漏洞。

One more thing, judging from the changelog, 27007 does not seem to fix that vulnerability.
Pzqqt's News Channel
https://github.com/topjohnwu/Magisk/issues/8330#issuecomment-2305742145 破案了。27007已修复此漏洞。 简单来说,此漏洞只会影响那些没有预装GMS的rom。 Okay. 27007 has fixed this vulnerability. Simply put, this vulnerability only affects those ROMs that do not have GMS pre-installed.
用简单易懂的话来解释一下这个漏洞的原理:
Magisk在检测到设备已安装GMS的情况下,会尝试调用com.google.android.gms(即Google Play服务)的某个方法,并且是以root权限调用的。
所以,攻击者可以伪造一个包名为com.google.android.gms的apk,并且实现Magisk需要调用的方法,然后Magisk就会以root权限执行攻击者编写的方法。
Magisk的修复方式也很简单:在尝试调用GMS的方法之前,先确保com.google.android.gms是系统应用
因此,该漏洞不影响已预装了GMS的rom。
首先,攻击者伪造的恶意apk很难成为系统应用。其次,对于已预装了GMS的rom,即便是用户主动安装该恶意apk,因为攻击者伪造的com.google.android.gms apk签名肯定是与Google的签名不同的,所以肯定不会安装成功,漏洞自然也无法被利用,除非用户手贱用核心破解模块绕过了apk签名认证。

综上所述,我有以下几点建议:
1. 介于该漏洞的利用方式已完全公布,因此请Magisk用户立即更新到27007版本;
2. 谨慎使用核心破解模块,你可以在确实需要时暂时启用该模块,但在日常使用时务必禁用;
3. 永远记住,谨慎安装未知来源的apk。

Let me explain the principle of this vulnerability in simple and easy-to-understand words:
When Magisk detects that GMS is installed, it will try to call a method of com.google.android.gms (i.e. Google Play Services), and call it with root privileges.
Therefore, an attacker can forge an apk with the package name com.google.android.gms and implement the method that Magisk needs to call, and then Magisk will execute the method written by the attacker with root privileges.
The fix for Magisk is also very simple: before trying to call the GMS method, make sure that com.google.android.gms is a system app.
Therefore, this vulnerability does not affect ROMs pre-installed with GMS.
First, it's difficult for the malicious apk forged by the attacker to become a system app. Secondly, For ROMs pre-installed with GMS, even if the user actively installs the malicious apk, because the signature of the com.google.android.gms apk forged by the attacker is definitely different from that of Google, it will definitely not be installed successfully, and the vulnerability cannot be exploited, unless the user uses the core cracking module to bypass the apk signature authentication.

In summary, I have the following suggestions:
1. Since the exploit method of this vulnerability has been fully disclosed, for Magisk users, please update to version 27007 immediately;
2. Use the core cracking module with caution. You can temporarily enable the module when you really need it, but be sure to disable it in daily use;
3. Always remember to install apks from unknown sources with caution.
Linux 6.11-rc5 Released With Slimmed Down Set Of Bcachefs Fixes
25 August 2024 - Linux 6.11-rc5

The Linux 6.11-rc5 kernel is already out as stable today, roughly a half-day ahead of time due to travels by Linus Torvalds.

Comments

#Phoronix #LinuxKernel
Pzqqt's News Channel
Melt Kernel v3.0 for marble/marblein By @pzqqt Download Source XDA Changelog & Note: - Too long, see here. About KernelSU: - Select through the volume keys during the installation process to install the kernel that supports KernelSU. - If the installer…
对于感觉Melt Kernel比较耗电的用户,试试在安装过程中选择禁用“DAMON-based Reclamation”。
目前Melt Kernel预设的DAMON-based Reclamation相关参数有些不合理,会导致kdamond长时间保持活跃,从而消耗较多的电量。在之后的版本中我会进行优化调整。

For users who feel that Melt Kernel consumes too much power, try disabling "DAMON-based Reclamation" during the installation process.
The default DAMON-based Reclamation parameters of Melt Kernel are not appropriate, which will cause kdamond to remain active for a long time, thus consuming more power. I will make optimization adjustments in the next version.
One Of The Rust Linux Kernel Maintainers Steps Down - Cites "Nontechnical Nonsense"
29 August 2024 - Rust For Linux Resignation

One of the several Rust for Linux kernel maintainers has decided to step away from the project. The move is being driven at least in part due to having to deal with increased "nontechnical nonsense" raised around Rust programming language use within the Linux kernel.

Comments

#Phoronix #LinuxKernel
Xiaomi.eu Multilang HyperOS ROM stable Update
2024-08-29
#Marble #XiaomiEU #HyperOS #Stable

Build date:
Thu, 29 Aug 2024 10:17:28 UT

MD5:
abadf82c0a7988daaa527fc18e04ad9e

Download:
xiaomi.eu_MARBLE_OS1.0.6.0.UMRCNXM_14.zip

Size:
5.4 GB
Linux 6.12 To Optionally Display A QR Code During Kernel Panics
29 August 2024 - DRM Panic Handler QR Codes

Submitted today via DRM-Misc-Next to DRM-Next for staging ahead of the Linux 6.12 merge window in mid-September is optional support for displaying a QR code within the DRM Panic handler infrastructure when a Linux kernel panic occurs.

Comments

#Phoronix #LinuxKernel
今天下午更新HyperOS.eu1.0.6.0.UMRCNXM,更新之后发现了一些问题:
1. Chrome闪退;
2. 其他app打开webview界面(比如:微信的“订阅号”)后闪退。
排除了内核、Magisk模块、Zygisk模块的影响后,初步怀疑是系统webview内核的问题。
打开设置 -> 更多设置 -> 开发者选项 -> WebView 实现,发现可选的WebView实现只有一个Android System WebView,版本号为127.0.6533.103。但在我的印象中,如果已经安装了Chrome的话,这里可选的WebView实现应该只有一个Chrome才对。
接下来开始解决问题。
首先解决问题2:卸载Chrome,这样app就会强制使用Android System WebView。
然后解决问题1:试着从Play商店重新安装Chrome,问题依旧。于是从APKMirror下载最新的Chrome apk,安装后问题解决。之后仍然可以从Play商店更新Chrome。
Rust Linux Developers Compared To Road Builders & Mapmakers
30 August 2024 - Airlie Comparison

Longtime Direct Rendering Manager (DRM) subsystem maintainer David Airlie of Red Hat has written an interesting blog post providing an analogy to types of developers compared to road builders and hotels.

Comments

#Phoronix #LinuxKernel
Melt-opensource-msm_drm-fe2453f3c2bd-HOS.zip
8.9 MB
SHA1: 8C317FB564B2267519CC0A7EDC7247F23FE609A2
Pzqqt's News Channel
Melt-opensource-msm_drm-fe2453f3c2bd-HOS.zip
What's this?
This package will replace your device's display driver (msm_drm.ko) with the open source build.
Compared with the official precompiled display driver, this new driver has the following advantages:
1. Completely disabled logspam.
2. The baseline version is newer (DISPLAY.LA.2.0.r1-13200-WAIPIO.0). This usually brings some performance improvements and bug fixes.

Where is the source code?
Here

How to install it?
Install it like you installed the kernel. You can install it in TWRP or in some apps (eg: Kernel Flasher)

Are there any known bugs?:
I haven't found any yet. Please try.
Btw, the AOD bug previously encountered on HyperOS has been fixed.

Which roms can install it?
- Official HyperOS rom (or some modified HyperOS roms without much modification, such as: HyperOS.eu).
- AOSP roms based on HyperOS official precompiled kernel modules.
- If you have already installed Melt Kernel, you can also install it.

Note:
- If you are using MIUI14 rom, or old AOSP rom based on MIUI14 firmware, you should NOT install it. Generally speaking, your installation will fail.
- Do NOT install it on an AOSP rom based on the LineageOS team's OSS kernel, unless you have already installed the latest version of Melt Kernel, otherwise you will definitely encounter boot failures.
Linux 6.11-rc6 Released With More Bcachefs Fixes & Other Kernel Fixes
1 September 2024 - Linux 6.11-rc6

Like with last week's Linux 6.11-rc5 release, Linux 6.11-rc6 is out a half-day early due to Linus Torvalds' ongoing foreign travels. Linux 6.11-rc6 brings many more fixes to this kernel that will debut as stable in mid-September,

Comments

#Phoronix #LinuxKernel
Pzqqt's News Channel
Melt Kernel v3.0 for marble/marblein By @pzqqt Download Source XDA Changelog & Note: - Too long, see here. About KernelSU: - Select through the volume keys during the installation process to install the kernel that supports KernelSU. - If the installer…
下个版本Melt Kernel的新特性预告:
相信绝大多数用户都会把右手大拇指的指纹录入到系统。当你走在路上想要关闭手机屏幕并把它塞到裤兜里时,可能会用右手大拇指去按下电源键,但是在关闭屏幕的瞬间很有可能会因为指纹唤醒而导致设备屏幕被重新点亮,然后你的手机就会在你的裤兜里尽情误触。
下个版本的Melt Kernel将在用户空间创建一个新的节点,写入这个节点可使得你的手机的指纹传感器在屏幕关闭后失效若干秒,从而避免误触问题。

New features of the next version of Melt Kernel:
I believe that most users will register the fingerprint of their right thumb into the system. When you walk on the street and want to turn off the screen of your phone and put it in your pocket, you may use your right thumb to press the power button. However, at the moment of turning off the screen, it is very likely that the device screen will be re-lit due to fingerprint wake-up, and then an accidental touch will occur.
The next version of Melt Kernel will create a new node in the user space. Writing to this node can make your phone's fingerprint sensor invalid for several seconds after the screen is turned off, thereby avoiding the problem of accidental touches.