Pacman (security vulnerability)

Pacman (stylized PACMAN or PacMan) is an exploit that takes advantage of a hardware bug in the speculative execution function of the Apple M1 processors which was made public on June 10, 2022, by MIT security researchers.[1][2] The flaw is in a hardware security feature called pointer authentication codes (PAC) and is believed to be intrinsic to the platform and unable to be patched.[3] The M1 was the first ARM desktop CPU to implement pointer authentication.[1] Apple stated that they did not believe the vulnerability posed a serious danger to users because it requires specific conditions to be exploited.[2] An exploit would involve a combination of memory corruption and speculative execution.

Pacman
Logo for Pacman exploit
Date discoveredPublicly disclosed June 10, 2022 (2022-06-10)
Date patchedUnable to be patched
Affected hardwareApple M1 processors
Websitepacmanattack.com

See also

References

  1. Ravichandran, Joseph; Na, Weon Taek; Lang, Jay; Yan, Mengjia (2022). "PACMAN". Proceedings of the 49th Annual International Symposium on Computer Architecture. ISCA '22. New York: Association for Computing Machinery. pp. 685–698. doi:10.1145/3470496.3527429. ISBN 9781450386104. S2CID 249205178.{{cite book}}: CS1 maint: date and year (link)
  2. Carly Page (June 10, 2022). "MIT researchers uncover 'unpatchable' flaw in Apple M1 chips". techcrunch.com.
  3. Phillip Tracy (June 10, 2022). "Newly Discovered Apple M1 Security Flaw is Unpatchable". gizmodo.com.


This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.