The flaw could theoretically give bad actors a door to gain full access to the core operating system kernel.
Before I go any further,M1 Macowners dont need to worry about having their sensitive data stolen.
Foremost, the system under attack needs to have an existing memory corruption bug.
Photo: Joanna Nelius/Gizmodo
As such, the scientists say there is no cause for immediate alarm.
It does this using PAC, or pointer authentication code that checks for unexpected changes resulting from an attack.
As the researchers discovered, this line of defense can be broken.
Thats where MITs PACMAN attack comes in.
In this scenario, the ghosts win.
Developers should take care to not solely rely on pointer authentication to protect their software.
Qualcomm and Samsung have either announced or are set to ship processors that use the security feature.
The researchers outlined three methods for preventing such an attack in the future.
Another potential resolution is by defending against PACMAN in the same way Spectre vulnerabilities are being mitigated.
And finally, patching memory corruption bugs would ensure this last line of defense isnt needed.
They also didnt provide enough evidence that a security patch pushed out to those devices made them significantly slower.
News from the future, delivered to your present.
Meta Pissed Off Everyone With Poorly Redacted Docs
Meta is being very transparent on accident.