awful.systems
  • Communities
  • Create Post
  • heart
    Support Lemmy
  • search
    Search
  • Login
  • Sign Up
@repostbot33@lemmy.worldB to netsec@lemmy.worldEnglish • 1 year ago

Gaining kernel code execution on an MTE-enabled Pixel 8

github.blog

external-link
message-square
0
fedilink
1
external-link

Gaining kernel code execution on an MTE-enabled Pixel 8

github.blog

@repostbot33@lemmy.worldB to netsec@lemmy.worldEnglish • 1 year ago
message-square
0
fedilink
In this post, I’ll look at CVE-2023-6241, a vulnerability in the Arm Mali GPU that allows a malicious app to gain arbitrary kernel code execution and root on an Android phone. I’ll show how this vulnerability can be exploited even when Memory Tagging Extension (MTE), a powerful mitigation, is enabled on the device.
alert-triangle
You must log in or register to comment.

netsec@lemmy.world

!netsec@lemmy.world

remote_follow_modal_title

Create a post
You are not logged in. However you can subscribe from another Fediverse account, for example Lemmy or Mastodon. To do this, paste the following into the search field of your instance: !netsec@lemmy.world

Technical news and discussion of information security.

Rules:

  1. Be excellent to each other
  2. Keep it on topic
  3. Absolutely no PII or doxing
  4. No disclosure posts
  • 0 users / day
  • 0 users / week
  • 0 users / month
  • 0 users / 6 months
  • 1.06K subscribers
  • 50 Posts
  • 0 Comments
  • Modlog
  • mods:
  • @t8r@lemmy.world
  • BE: 0.19.3
  • Modlog
  • Instances
  • Docs
  • Code
  • join-lemmy.org