Conversation

twitter.com/EtTuCarl/statu It's 3 vulnerabilities in Skia, which is a 2D rendering library used by Android, Firefox and Chromium. It's widely used and the context where an attacker could gain code exec varies. For Chromium on Android it's in the Chrome or WebView renderer sandbox.
Quote Tweet
@DanielMicay Do you know exactly what part of Android does this (specific to built-in photo app, webview, or something else)? twitter.com/cybersecboardr…
2
6
Replying to
They made it because Cairo has terrible performance and varying output across platforms. I'd expect that Cairo has bigger security problems too, but doesn't get nearly as much attention because it's not exposed in two of the major browsers as the 2D canvas implementation.
3
2
Replying to and
There's literally a browser API which supports updating firmware on devices which mostly have no signature verification for the updates. The manufacturers consider that an important feature, even including the fact that there's no signature verification.
1
2
Show replies
Replying to
Yeah, I'm just saying it's a systemic issue and there's a ton of attack surface that's rapidly growing. They keep adding new features and rarely acknowledge the security implications. Privacy gets taken into account in the specs but the features usually get added regardless.
1
2
Show replies