Another Android Bug Squashed
This Android bug makes you wonder about the Quality Control process at Google/HTC. During boot up, a command shell is silently started up as root and every keystroke typed in is invisibly interpreted as a command and executed with superuser privileges. They already fixed the bug and are rolling out updates but you'll want to check your build version just to be sure.
This Android bug makes you wonder about the Quality Control process at Google/HTC. During boot up, a command shell is silently started up as root and every keystroke typed in is invisibly interpreted as a command and executed with superuser privileges. They already fixed the bug and are rolling out updates but you'll want to check your build version just to be sure.
From the home screen select Menu > Settings > About phone, and look for the Build number (near the bottom). If you see “kila-user 1.0 TC4-RC29 115247 ota-rel-keys,release-keys†then you're vulnerable. If you see anything later than RC29 then you already have the fix.