Google Project Zero researcher details the second stage of a Pixel 9 exploit chain: escaping the mediacodec sandbox through vulnerabilities in the BigWave AV1 decoder driver. The researcher discovered three bugs in /dev/bigwave, including a use-after-free that enables arbitrary kernel read/write. The exploit bypasses KASLR

12m read time From projectzero.google
Post cover image
Table of contents
The (Very Short) Bug HuntThe Nicest BugDefeating KASLR (by doing nothing at all)Creating an arbitrary read/writeIntegrating into the Dolby exploitFinalizing the exploit

Sort: