TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Attacking the Samsung Galaxy A* Boot Chain

25 点作者 sipofwater7 个月前

3 条评论

mdaniel7 个月前
&gt; Samsung added a custom JPEG parser in Little Kernel that is used to show logos and error messages while booting. The code responsible for loading the JPEG file will place it in a fixed-size structure on the heap. But it never checks the size of the file, causing a heap overflow.<p>Heh, file format parsers - the GIFt that just keeps on giving
评论 #41943998 未加载
daghamm7 个月前
Are Samsungs &quot;contributions&quot; to LK public? Has nobody reviewed those until now?<p>The early bootchain components are critical to the security of the device. I am extremly surprised Samsung let a complete noob add code to it.
ragu4u7 个月前
So I guess this is where widevine keys and whatnot are stored? Perhaps this is how the piracy scene gets 4k rips.
评论 #41929266 未加载
评论 #41929647 未加载