A 0-click exploit chain for the Pixel 10

(projectzero.google)

74 points | by happyhardcore 1 hour ago

7 comments

  • shay_ker 45 minutes ago
    Hmmm... I'd like someone to double check my thinking here. I posted this exact prompt for gpt 5.5 xhigh:

    ```

    does this look right to you? don't do any searches or check memory, just think through first principles

    static int vpu_mmap(struct file fp, struct vm_area_struct vm) { unsigned long pfn; struct vpu_core core = container_of(fp->f_inode->i_cdev, struct vpu_core, cdev); vm_flags_set(vm, VM_IO | VM_DONTEXPAND | VM_DONTDUMP); / This is a CSRs mapping, use pgprot_device */ vm->vm_page_prot = pgprot_device(vm->vm_page_prot); pfn = core->paddr >> PAGE_SHIFT; return remap_pfn_range(vm, vm->vm_start, pfn, vm->vm_end-vm->vm_start, vm->vm_page_prot) ? -EAGAIN : 0; }

    ```

    And it correctly identified the issue at hand, without web searches. I'd love to try something more comprehensive, e.g. shoving whole chunks of the codebase into the prompt instead of just the specific function, but it seems the latent ability to catch security exploits is there.

    So then.... I wonder how this got out in the first place. I know I'm using a toy example but would love to learn more!

    • lifis 31 minutes ago
      It's the usual problem of having no consequences for the person who wrote catastrophic code like this and the company who released it. If the person who wrote this were to be imprisoned for the rest of their life, for instance, or if the company were to be fined $1 million per user put at risk (which would probably mean a $1-10 trillion fine for Google -enough to trigger bankruptcy), then things would be very different
      • StilesCrisis 19 minutes ago
        If this rule were implemented, would you be walking free right now? Think it over.
        • ux266478 1 minute ago
          I most definitely don't agree with him, and I find the idea absolutely repugnant. Devils advocate though, I would be much more careful with the code that I write if regulators passed some dogshit law like that.
      • akersten 23 minutes ago
        > If the person who wrote this were to be imprisoned for the rest of their life [...] then things would be very different

        Yes, they certainly would. You wouldn't have smartphones, for instance.

        I can't tell if this is satirical or not. But there are so many takes like this recently (hold the website liable for user content, hold the corporate developer liable for zero days in a project they happened to touch) that would all result in the same outcome (no more product at all) that I can't help but wonder if there's some luddite psy-op trying desperately to bring us back to a pre-Internet era in any way they can...

      • XorNot 26 minutes ago
        Yes...no one would write any code.
  • phuff 57 minutes ago
    This is a great bug report! I am not a kernel expert by any means even though I have read some about it... 10+ years ago. And I was able to follow along and see what was going on.

    It does make me scared for what other dangers lurk since this was a really bad one and it was so little work to find.

    Also of note: so many security issues lately have been done using AI. This report makes me think two things:

    1. Expertise is still immensely valuable, the more niche, the more valuable.

    2. There are lots of niches still where AI doesn't dominate...

  • revolvingthrow 43 minutes ago
    Semi-related: has the rate of published exploits picked up as if late, or is it simply the fact that there’s hype around ai as security tool (offense or defense) so it’s simply in the news more often?

    Feels like there’s something new every other day - linux, windows, mobile, various commonplace tools used by everybody, the list goes on

    • rcxdude 35 minutes ago
      There are reports from people who manage security bugs in OSS that there has been a big uptick in reports: initially low quality ones that were mostly bogus, but now many more legitimate ones as well.
    • deaton 9 minutes ago
      This is pure guesswork, I am not a security researcher, but my guess would be that AI is increasing the amount of low quality exploitable attack surface available, while simultaneously providing security researchers with an accelerant for their work. Which is to say, its great if you use it well and really bad if you use it poorly.
      • seanieb 0 minutes ago
        Not low quality if it works!
    • bbayles 32 minutes ago
      I've reported a few very serious issues to vendors of widely used tools in recent weeks, and it's been even more difficult than usual to get them to be acknowledged - the teams that respond are reportedly swamped.
    • imenani 32 minutes ago
    • worldsavior 27 minutes ago
      I think AI helped researchers navigate better in the codebase, not necessarily the AI is succeeding in exploiting.
  • greesil 45 minutes ago
    "This is notably fast given that this is the first time that an Android driver bug I reported was patched within 90 days of the vendor first learning about the vulnerability."

    This makes me feel better about Google, but also makes me kind of frightened of the rest of Android. I wonder what Apple's response time is?

    • yogorenapan 25 minutes ago
      I've reported security bugs to Apple before. Was a couple years back but I remember it taking around 6 months to patch (there was a couple back and forth for me to get a more reliable POC). Maybe 2 months from when I submitted a POC with 100% reproducibility
  • codedokode 43 minutes ago
    I read about Pixel 9 Dolby Decoder bug, and it is based on integer overflow. It was a mistake to allow "+" operator to overflow, and this must be fixed in new languages like Rust, but it is not.
    • jerf 23 minutes ago
      I've been using this as a touchstone for whether or not we are actually going to take security seriously for a long time.

      We've moved slightly closer to this, but in a world where we're still arguing over memory safety being necessary we've probably still got a ways to go before we notice that addition silently overflowing is a top-10 security issue. It's the silent top-10 security issue, I guess.

  • NooneAtAll3 45 minutes ago
    fascinating how GrapheneOS achieves high security level on the same hardware where Google failed to even randomize android's kernel location
    • jnwatson 9 minutes ago
      Randomizing the kernel location is of marginal utility at best. There are so many info leaks that KASLR ends up being only a small speed bump on the way to exploitation.

      Here's a cool project that inventories all your KASLR info leaks: https://github.com/bcoles/kasld

    • StilesCrisis 17 minutes ago
      It's easy to be secure if you just remove features. There's obvious tension here.
    • icf80 39 minutes ago
      google has lost its focus with pixel phones