/self/proc/mem
/self/proc/mem
Posted Jan 17, 2026 5:15 UTC (Sat) by cypherpunks2 (guest, #152408)Parent article: A 0-click exploit chain for the Pixel 9 (Project Zero)
> This syncframe uses DYNAMIC WRITE FAST to write ‘wb’ and “/self/proc/mem” to the address above, so they are available as parameters for a future fopen call, then moves the skip pointer to dynamic_base + 0xD000, so they aren’t immediately corrupted.
> Likewise, the accessibility of /self/proc/mem was a big shortcut to exploitation. Since it is only used during debugging, I wonder if it is possible to implement some sort of mitigation that makes it inaccessible when a device is not being debugged.
I assume they mean /proc/self/mem? I wonder how they made that kind of mistake twice.
