The covert channel bug is harmless, but it demonstrates that even new CPUs have mistakes in them.
The covert channel bug is harmless, but it demonstrates that even new CPUs >> have mistakes in them.
Clickity, clack, don't go back!
On 2022-06-11, Alan Browne <bitbucket@blackhole.com> wrote:
The covert channel bug is harmless, but it demonstrates that even new CPUs >>> have mistakes in them.
Clickity, clack, don't go back!
If that's a song, the words you seek most likely are in yakity yak by the coasters pandabear, although they could also be found in the tune of
clickity clack don't come/talk back. But not "don't go back."
The dubbing of CVE-2021-30747 is M1RACLES which stands for M1ssing Register Access Controls Leak EL0 State which is the right of the security
researcher who found it to name it.
This unpatchable M1 hardware vulnerability
What part of "harmless" is giving you an issue, Clicky?
On 2022-06-11, Alan Browne <bitbucket@blackhole.com> wrote:
What part of "harmless" is giving you an issue, Clicky?
No need to slander exact accurate reports.
https://vulmon.com/vulnerabilitydetails?qid=CVE-2021-30747
M1RACLES is a covert channel vulnerability in the Apple Silicon "M1" chip.
A flaw in the design of the Apple Silicon "M1" chip allows any two applications running under an OS to covertly exchange data between them, without using memory, sockets, files, or any other normal operating system features. This works between processes running as different users and under different privilege levels, creating a covert channel for surreptitious
data exchange. The vulnerability is baked into Apple Silicon chips, and cannot be fixed without a new silicon revision.
Sysop: | Keyop |
---|---|
Location: | Huddersfield, West Yorkshire, UK |
Users: | 296 |
Nodes: | 16 (2 / 14) |
Uptime: | 67:43:29 |
Calls: | 6,654 |
Files: | 12,200 |
Messages: | 5,331,962 |