Google Project Zero just dropped a full 0-click exploit chain for Pixel 9 targeting CVE-2025-54957 in Dolby's audio decoder. Android's AI transcription features auto-decode incoming audio, so attackers just need to send you a malicious RCS message.
#GrapheneOS users aren't immune to the initial bug since it's in Dolby's proprietary blob with its own internal allocator, but hardened_malloc and improved mediacodec sandboxing make privilege escalation significantly harder. Patch to January 2026 security level now!
https://projectzero.google/2026/01/pixel-0-click-part-1.html
Final (nprofile…0md0) any thoughts on this?
