View Single Post
Old August 26th, 2010, 10:19 PM   #32 (permalink)
Thread Author (OP)
OMJ's Avatar
Join Date: Nov 2009
Location: Pennsylvania
Posts: 3,288
Device(s): Thunderbolt, Fascinate, Nook
Carrier: Not Provided

Thanks: 37
Thanked 831 Times in 456 Posts

Originally Posted by whiterabbitorg View Post
Weird. I'm not sure how that method works. It was reported that this update would fix the udev bug used by one click root: CVE - CVE-2009-1185 (under review)

Maybe the droid 2 method does it a different way. It will be interesting to see how this plays out then. I was looking forward to this update so my droid would be more secure.
I haven't had a chance to really look at the bin file from the d2 method but I read something about it basically being exploid backwards/reversed. I'm not quite sure how it works but I tihnks its very similar to the original exploid
I take no responsibility for what you do to your phone. I only offer advice.
OMJ is offline  
Reply With Quote