OK I was asked by acidbath, speaking for the dev team from XDA, to post updates here on AF of their latest news, findings, etc.
I will post everything I get here in the first post on this thread. Got the first update VIA email last night.
I am merely the messenger, so don't shoot me
NEW UPDATE 2/23/2010
UPDATE 2/10/10
I will post everything I get here in the first post on this thread. Got the first update VIA email last night.
I am merely the messenger, so don't shoot me
NEW UPDATE 2/23/2010
February 23rd 2010.
We have added lots of new faces and Devs to our team
Everyone is working very hard to get Root!
I updated more exploits/methods tried.
Thanks everyone for all the amazing support!
I also added some working exploits for everyone to check out
LET'S ALL STAY POSITIVE!
Our Amazing Developers:
1. Binny1070
2. Pinksocker
3. Raziken
4. Punk.kaos
5. Rigamrts
6. Zifnab06
7. Jamezelle
8. Ht123
9. Zanfur
10. Mainfram3
11: caboos3
12. Captainkrtek
13. Framework43
Support Team:
Video:
CPCookieMan
Pics/Graphics:
Framework43
For all information see XDA thread:
http://forum.xda-developers.com/showthread.php?t=617203
UPDATE 2/10/10
older VVFebruary 10th 2010.
Hello all Eris/Desire Users,
Thanks for your patience and support!
The "Eris Root Dev Team" is hard at work, and trying their very best to get Root.
We all want the same thing, and appreciate all the kind words and supoort from this community!
I wanted to release some more Methods/Exploits that have been tried for the community:
1.
Tried:
http://www.securityfocus.com/bid/37068/info Here is some more info on it. Problem Description: Some vulnerabilities were discovered and corrected in the Linux 2.6 kernel: Array index error in the gdth_read_event function in drivers/scsi/gdth.c in the Linux kernel before 2.6.32-rc8 allows local users to cause a denial of service or possibly gain privileges via a negative event index in an IOCTL request. (CVE-2009-3080).
Result:
SCSI support hasn't been compiled in for our device
2.
Tried:
http://www.securityfocus.com/bid/36901/exploit
Result:
This exploit is better known in the Android community as "asroot2".
Vulnerable Devices:
Hero
Patched Devices:
Droid Eris (Desire)
3:
Tried:
http://www.securityfocus.com/bid/36827/info
Result:
Just a local information disclosure bug; definitely the cocoon of a vulnerability, but not a vulnerability in itself.
4:
Tried:
http://www.securityfocus.com/bid/37806/exploit
Result:
Turns out our device was not vulnerable.
5:
Tried:
http://www.securityfocus.com/bid/37762
Result:
Just a vulnerability against etables, a firewall and internet traffic filtering software.
6:
Tried:
Replacing the stock imgs in the google SDK with that we have gotten from the eris to adb pull files.
Result:
All of what the RUU does can be found in the same place as "rom.zip" after it has been loaded. XDA has a tutorial, I don't remember where just somewhere in %APPDATA%/Temp. The "fastboot oem" commands only work in oem-78 mode (or w/e it is). We still can't push unsigned zip's here though, tried and failed.
There are also some other methods that are being tried and worked, but they are still "In Progress".
I know that to most following this thread or others that dont have a lot of Kernel experience this wont mean much to you, but I want to make sure everyone knows that we are hard at work, and most important I want everyone in this community to feel part of this project!
Thank You again from all of us for your support!
I hope to have great news for all Eris/Desire users in the future
(Older methods/exploits tried can be found at main XDA Root Thread: http://forum.xda-developers.com/showthread.php?t=617203)
January 30th, 2010
Hello all fellow Htc Eris/Desire owners,
As you may or may not know, we have a newly formed Eris Root Dev Team and Website up and running! The site is not open to the public just yet, but it has been up and running for staff and developers for a week now. Once we have made all the necessary preparations, the website will become available for public viewing.
The site and team was created with the sole purpose of bringing developers together in a safe and friendly environment where they can focus on rooting and developing the Eris without distractions. We all know how off topic and random forums can get, so we felt that this was the best solution in order to get our Eris rooted!
The Team has appointed me as the Spokesperson/P.R man for the site and team. It is my job to field any and all questions or concerns, along with updating fellow Eris users on root status and other site news. If you are a developer and would like to become part of our great team please email me, and I will ensure that our developers review your offer to help.
We hope that our developer team will grow and expand, and in the future add more devices. The goal is to create a long term team that will continue to work together to root android devices and possibly chef roms for devices as well.
Root Status:
Currently the effort is going well. Our Developers have obtained 30% of the necessary files, and have a few different plans of attack/exploits being followed up on.
Our Developers:
1. Binny1070
2. Pinksocker
3. Raziken
4. Punk.kaos
5. Rigamrts
6. Zifnab06
And myself.
We appreciate all the support from the various forums and members all over the net! From Xda-developers to Androidforums.com to mydroidworld.com and all the others! We look forward to contributing to the vast and amazing online community of Android Development.
Thanks You and Let’s Root!!