Hacker Newsnew | past | comments | ask | show | jobs | submitlogin
Voucher_swap: Exploiting MIG reference counting in iOS 12 (googleprojectzero.blogspot.com)
28 points by gok on Jan 29, 2019 | hide | past | favorite | 3 comments


Curious to hear more about the "bypass Apple's implementation of ARMv8.3 Pointer Authentication (PAC) on A12 devices like the iPhone XS."

Is this new ARMv8.3 feature already broken?


I would guess holes in the coverage, or insufficient discrimination for authenticating.

But yeah, I’m looking forward to finding out what they exploited.


I haven’t used MIG much, but it’s always seemed like a security nightmare. It’s somewhat convenient, but the codegen part looks really sketchy and of course with separation like this it’s easy to forget memory management guidelines, etc.




Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: