Editing Vulnerabilities
Jump to navigation
Jump to search
The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 986: | Line 986: | ||
* Around 6.50-6.70, device access got blocked or removed. Now you can no longer access devices from the web browser. | * Around 6.50-6.70, device access got blocked or removed. Now you can no longer access devices from the web browser. | ||
=== | === WebKit implements pointer poisoning for 6.xx firmwares === | ||
* For select types implemented by WebKit (such as JSC::JSFunction), certain pointer fields are XOR'ed by a cryptographic key generated at runtime. The key is generated once every process launch, one must recover it to unpoison the pointers. | * For select types implemented by WebKit (such as JSC::JSFunction), certain pointer fields are XOR'ed by a cryptographic key generated at runtime. The key is generated once every process launch, one must recover it to unpoison the pointers. |