Get the latest tech news

The Qualcomm DSP Driver – Unexpectedly excavating an exploit


Posted by Seth Jenkins, Google Project Zero This blog post provides a technical analysis of exploit artifacts provided to us by Google's Thr...

The Application Digital Signal Processor Remote Procedure Call driver (or adsprpc for short) is primarily used for offloading multimedia processing to a more efficient DSP co-processor core. They have two separate refcounts refs and ctx_refs and they can be referenced from multiple places at once, including a context (an object that tracks data associated with a single RPC call), the global or local map lists, and of course transient stack-based references when being created or destroyed. Improving both the consistency and quality of code and the efficiency of the third-party vendor driver patch dissemination process are crucial next steps in order to increase the difficulty of privilege escalation on Android devices.

Get the Android app

Or read this on Hacker News

Read more on:

Photo of Exploit

Exploit

Photo of qualcomm dsp driver

qualcomm dsp driver

Related news:

News photo

Mitel MiCollab zero-day flaw gets proof-of-concept exploit

News photo

Exploit released for critical WhatsUp Gold RCE flaw, patch now

News photo

Mystery Palo Alto Networks hijack-my-firewall zero-day now officially under exploit