top | item 43337789

(no title)

keisborg | 11 months ago

I would hope so, but on

Tarlogics blog post, it is mentioned “modifying chips arbitrarily”, “infecting chips with malicious code”, “obtain confidential information stored on them”.

Even though they rephrased the backdoor wording, the remaining statements make me believe the undocumented functions can be used to gain code execution on the main cpu.

discuss

order

unsnap_biceps|11 months ago

They do not. They require arbitrary code execution on the main cpu to be used.

keisborg|11 months ago

So, they are basically saying that bash is vulnerable to arbitrary command execution?