![]() |
#46 |
Enthusiast
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 29
Karma: 100000
Join Date: May 2023
Device: Kindle family
|
There are two exploits that work on 5.16.2.1 that I am waiting (and waiting, and waiting) for Amazon to formally close so I can disclose the write-up and let folks have at it.
One of the exploits requires specific corruption of the FAT file-system. This is being mitigated in the 5.16.3 family by converting from mass storage to MTP.. The other exploit is at the Javascript level As far as I can tell, it is still present in 5.16.3 -- it will need to be fixed on all devices in parallel, and it really needs to be fixed. Now, with that said, I'm not a Jailbreak writer. All these exploits do is give you the ability to execute arbitrary code as root. There are additional pieces that needs to be done so the Kindle Jailbreak Framework works. This has to be done with some degree of caution because something the Framework does can cause a boot loop if a certain file doesn't get +x permissions. Which is a long way of saying, if you want a jailbroken Kindle stay on the firmware it came with, and impatiently wait. |
![]() |
![]() |
![]() |
#47 |
Zealot
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 125
Karma: 2691856
Join Date: Feb 2022
Device: PPW5, Quaderno A4, Supernote A6X, Leaf 2
|
Oh so this is the main reason for MTP. I don't buy the argument that Amazon went MTP to lock down the device more, and this is a much more reasonable explanation. Thank you.
|
![]() |
![]() |
Advert | |
|
![]() |
#48 |
Grand Sorcerer
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 5,772
Karma: 103362673
Join Date: Apr 2011
Device: pb360
|
|
![]() |
![]() |
![]() |
#49 |
Zealot
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 125
Karma: 2691856
Join Date: Feb 2022
Device: PPW5, Quaderno A4, Supernote A6X, Leaf 2
|
|
![]() |
![]() |
![]() |
#50 | |
Enthusiast
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 28
Karma: 12656
Join Date: Aug 2023
Device: Kindle Scribe.
|
Quote:
|
|
![]() |
![]() |
Advert | |
|
![]() |
#51 |
Junior Member
![]() Posts: 4
Karma: 14
Join Date: Mar 2022
Device: Kindle Paperwhite 2021
|
May be, this almost common Linux vulnerability can be used for new JB?
https://blog.qualys.com/vulnerabilit...e-glibcs-ld-so |
![]() |
![]() |
![]() |
#52 |
Evangelist
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 448
Karma: 3456809
Join Date: Jul 2023
Device: Scribe 2022, OA2, PRS-350
|
> This vulnerability was introduced in April 2021 (glibc 2.34)
This is a very narrow window of vulnerability, esp. for production embedded devices. Amazon does not use glibc in these devices. I just checked the most recent 5.16.3.1 code for the Scribe and Amazon uses klibc_1.5.25. So they use an old version even of that (current klibc is 2.0.10). https://www.amazon.com/gp/help/custo...deId=200203720 https://en.wikipedia.org/wiki/Klibc EDIT: I guess I could be misreading what they use klibc for. It may not be for the userland on a fully booted kernel. In any case, Amazon isn't using bleeding edge versions, nor even "fresh" versions. Last edited by Frogm4n; 10-04-2023 at 03:28 PM. |
![]() |
![]() |
![]() |
#53 |
Enthusiast
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 29
Karma: 100000
Join Date: May 2023
Device: Kindle family
|
The exploit closed in 5.16.3 seems to have been around for quite some time .. it seems to range from 5.14.x. until 5.16.3, and quite possibly older.
|
![]() |
![]() |
![]() |
#54 |
Enthusiast
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() Posts: 28
Karma: 12656
Join Date: Aug 2023
Device: Kindle Scribe.
|
Not to be on the eta wen team, but does 5.16.3.1 satisfy your remaining requirements for disclosure? Also, do you think a Bluetooth exploit like bleedingtooth could be adapted?
|
![]() |
![]() |
![]() |
#55 | |
Junior Member
![]() Posts: 1
Karma: 10
Join Date: Feb 2023
Device: KOA3
|
Quote:
![]() |
|
![]() |
![]() |
![]() |
|
![]() |
||||
Thread | Thread Starter | Forum | Replies | Last Post |
Firmware Update Kindle Firmware 5.15.1.1 | jhowell | Amazon Kindle | 46 | 06-11-2023 09:48 AM |
Firmware Update Kindle Firmware 5.12.2 Available | Shad Plante | Amazon Kindle | 24 | 11-02-2019 04:48 PM |
Firmware Update Kindle firmware 5.12.1 | eilon | Amazon Kindle | 102 | 09-26-2019 08:38 PM |
Amazon Kindle, firmware 5.6.5, about jailbreak closed kindle. | Lenorav | Kindle Developer's Corner | 6 | 04-26-2016 04:39 PM |
DX(G) Updating Kindle DX firmware -- any Kindle 3 owners willing to help? | antithesis | Kindle Developer's Corner | 1 | 04-23-2014 04:47 PM |