Sebastian Krahmer, author of the oft-used “rageagainstthecage” root exploit for Android brings us a new release today, titled “Gingerbreak”. The Gingerbreak code once again allows us to root any device running Android Gingerbread 2.3 or higher (although some porting and adaptation must be done first, to build a one-click type tool).
rageagainstthecage used a security vulnerability present in Android to bypass the operating system’s security, allowing super-user access. Google released code to fix this security hole with Gingerbread and a point release for Froyo (2.2.2), preventing the exploit from gaining root. Unfortunately not every device received an update to the fixed version, leaving some devices vulnerable to apps that used the root exploit maliciously.
Devices running a Froyo version 2.2.2 or higher, or running Gingerbread 2.3 or higher were left un-rootable through typical methods. Alternatives such as rooting a previous, vulnerable version of the firmware and taking action to preserve super-user access through the update process to the protected version work well, but require many extra steps. With this latest release we are now able to root Gingerbread in the same manner as Froyo, Eclair, and previous Android releases, and one-click tools such as SuperOneClick won’t be too far off. Chainfire at XDA has already released a preliminary version for the Galaxy S i9000 JVB 2.3.3 ROM, available at the XDA link below.