Google Project Zero researcher details the second stage of a Pixel 9 exploit chain: escaping the mediacodec sandbox through vulnerabilities in the BigWave AV1 decoder driver. The researcher discovered three bugs in /dev/bigwave, including a use-after-free that enables arbitrary kernel read/write. The exploit bypasses KASLR
•12m read time• From projectzero.google
Table of contents
The (Very Short) Bug HuntThe Nicest BugDefeating KASLR (by doing nothing at all)Creating an arbitrary read/writeIntegrating into the Dolby exploitFinalizing the exploitSort: