Google Project Zero researcher details the second stage of a Pixel 9 exploit chain: escaping the mediacodec sandbox through vulnerabilities in the BigWave AV1 decoder driver. The researcher discovered three bugs in /dev/bigwave, including a use-after-free that enables arbitrary kernel read/write. The exploit bypasses KASLR

12m read timeFrom projectzero.google
Post cover image
Table of contents
The (Very Short) Bug HuntThe Nicest BugDefeating KASLR (by doing nothing at all)Creating an arbitrary read/writeIntegrating into the Dolby exploitFinalizing the exploit

Sort: