Pacman (security vulnerability)
Pacman (stylized PACMAN or PacMan) is an exploit that takes advantage of a hardware bug in the speculative execution function of the Apple M1 processors which was made public on June 10, 2022, by MIT security researchers.[1][2] The flaw is in a hardware security feature called pointer authentication codes (PAC) and is believed to be intrinsic to the platform and unable to be patched.[3] The M1 was the first ARM desktop CPU to implement pointer authentication.[1] Apple stated that they did not believe the vulnerability posed a serious danger to users because it requires specific conditions to be exploited.[2] An exploit would involve a combination of memory corruption and speculative execution.
Date discovered | Publicly disclosed June 10, 2022 |
---|---|
Date patched | Unable to be patched |
Affected hardware | Apple M1 processors |
Website | pacmanattack |
See also
References
- Ravichandran, Joseph; Na, Weon Taek; Lang, Jay; Yan, Mengjia (2022). "PACMAN". Proceedings of the 49th Annual International Symposium on Computer Architecture. ISCA '22. New York: Association for Computing Machinery. pp. 685–698. doi:10.1145/3470496.3527429. ISBN 9781450386104. S2CID 249205178.
{{cite book}}
: CS1 maint: date and year (link) - Carly Page (June 10, 2022). "MIT researchers uncover 'unpatchable' flaw in Apple M1 chips". techcrunch.com.
- Phillip Tracy (June 10, 2022). "Newly Discovered Apple M1 Security Flaw is Unpatchable". gizmodo.com.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.