• After 15+ years, we've made a big change: Android Forums is now Early Bird Club. Learn more here.

Root CM10 progress Update Thread

the problem with my service was that somehow it got switched from NV to RUIM/SIM. I found the setting and swithed it back and I am good now. Just wanted to set minds at ease that the rom is ok to flash and test. I had been messing with other settings on phone and I guess I hit that and didnt remember.

Stay groovy

Yeah I swapped my to RUIM/SIM to test then back to NV. However, data works fully though MMS does not work. But, I'm sure there are some MMS fixes that can be added in later. I got 1.5mbps 3G speeds with 1x showing. Hopefully 4G LTE is ironed out and the com.android.phone force closing gets fixed up so phone calls can be made !
 
sounds good, thanks. i was just saying because allot of phones that i have flashed before crash talkback at first settup, or google tts doesn't work and i have to ask someone to sign in to my google stuff for me, download a text to speach voice, inable it, etc. well i hope he prevails!
Our almighty totlth is working out some issues with it. The only issue that I'm aware of is the data over wifi and cellular isn't working right now, but everything else is good.
 
I would test it, but its my primarry phone. and sorry if i go a little off topick, but my phone resently started dropping calls, even when i got 3 bars of signal. does anyone know of anything i can try? and again, sorry for diverting from the topick and thanks in advance. :)
Has anyone had any success with data connecting?
 
I ws just reading a G+ article about a new update addressing the latest security flaw. What are the chances this could be used for this ROM or is it too late?
 
I ws just reading a G+ article about a new update addressing the latest security flaw. What are the chances this could be used for this ROM or is it too late?

How so? Details?

ZeroGeined if your talking about Kutulukid's post Kutulukid is mentioning the update Google has pushed out to patch to fix this vulnerability. I'm no developer but I would think we would have to get a working CyanogenMod 10.1 to update to get 10.1.2.
 
Thank you. Although it is stated that the security vulnerability had been since 1.6, there is a big flaw with that article: "To provide a figure of how behind some Android users are, some 36% of devices are still running Android 2.3..."

And Windows 7 can run fantastic on a machine built for Windows ME too, right?
 
Thank you. Although it is stated that the security vulnerability had been since 1.6, there is a big flaw with that article: "To provide a figure of how behind some Android users are, some 36% of devices are still running Android 2.3..."

And Windows 7 can run fantastic on a machine built for Windows ME too, right?

Not to argue the point, but just to toss in my two cents. I do understand how that quote can be misinterpreted, but the malware in question was an apparent exploit from 1.6 to 4.2.2. Though if this malware were to come about I would just restore to stock just like I would do with Windows.
 
Yeah, this is using your CM10. I'm working on seeing what all I can get fixed with simple flashes etc. What I find I'll let you know, if anything.

Edit: So far, I've only been able to get data what appears to be 3G speeds and GAPPS on to work properly, still cannot make phone calls due to the force close on "com.android.phone"

GAPPS to implement totlth Goo.im Downloads - Downloading gapps-jb-20121011-signed.zip
The GOOGLE search will error out but once you update it through google play, it works perfectly fine.

How I've done it so far.

1. Flash PRL 2032 with QPST
2. Reboot recovery flash GAPPS from above ^
3. Settings> More...> Mobile Networks> I have data, data roaming, national data roaming all 3 checked
4. Network Mode CDMA/EvDo auto.
5. System Select Automatic.
6. CDMA subscription: NV

Of course this isn't a daily goer, but it'll give you guys an idea of what to expect, hope I've helped others get his tester on mobile network.

how do you flash prl i can't get port to work
 
I did that but nothing no port and I have that but I saw the ftm moden don't work too I will try againg
Hm, I'm not sure it works fine for me. Be sure of what QPST build you're using to double check. I had issues at first, could be you need to reboot your computer or phone.
 
Not to argue the point, but just to toss in my two cents. I do understand how that quote can be misinterpreted, but the malware in question was an apparent exploit from 1.6 to 4.2.2. Though if this malware were to come about I would just restore to stock just like I would do with Windows.

Wow. Its been lively in here. :-) But to touch back on my question. Would a 10.1.2 "patch" be feasible or is this something that would not be worth the effort?
 
Wow. Its been lively in here. :-) But to touch back on my question. Would a 10.1.2 "patch" be feasible or is this something that would not be worth the effort?

Yeah it's been more social seeing more progress from totlth :) Though it has been a couple of days, wonder if he's gotten any further in getting things fixed up. 'cause I'm still impatient to get off of stock. Also, I wonder if req would give totlth a hand at fixing up an OC kernel for us ;o
 
Wow. Its been lively in here. :-) But to touch back on my question. Would a 10.1.2 "patch" be feasible or is this something that would not be worth the effort?

Any way to prevent malware is worth the effort, but at the moment there isn't a way to get to that point. We are still working on Cyanogenmod 10 and this the patch is in Cyanogenmod 10.1.2. We still have a little time before even considering the idea.
 
you guys arent really understanding it all, that patch was merged in to mainline cm. all that needs to happen is repo sync and then rebuild. tada you now are protected, of course you were protected before if you didnt enable unknown sources and install random apk's from websites/emails. the google play store is already patched against this so you arent going to get it there.

oh and the media is really blowing this exploit out of teh water IMO. in order for me to exploit the zte avid i have to download a stock rom, grab a system file that has a classes.dex in it modify it to run the malicious code and set it in hopes of catching a zte avid owner. cuz that apk wont mean crap to a zte vital which has a different signature on its system.

so really and truly, do you think malware people are gunna have their sights on yall? or the millions of people who bought the sgs3? :P (the sgs4 is already patched)
 
Back
Top Bottom