Navigation
Search
|
Man Yue Mo: Gaining kernel code execution on an MTE-enabled Pixel 8
Tuesday March 19, 2024. 02:39 PM , from LWN.net
Man Yue Mo explains
how to compromise a Pixel 8 phone even when the Arm memory-tagging extension is in use, by taking advantage of the Mali GPU. So, by using the GPU to access physical addresses directly, I'm able to completely bypass the protection that MTE offers. Ultimately, there is no memory safe code in the code that manages memory accesses. At some point, physical addresses will have to be used directly to access memory.
https://lwn.net/Articles/965926/
|
25 sources
Current Date
Nov, Fri 22 - 01:35 CET
|