Arm Memory Tag Extensions broken by speculative execution
Briefly

MTE works by tagging 16-byte blocks of physical memory with four bits of metadata, allowing access with a matching key; a mismatch triggers an error, aiding in detecting memory safety violations.
Programs utilizing MTE can tag memory blocks with a key and generate pointers containing the key, detecting mismatches on subsequent use post key changes, revealing programming bugs or exploit attempts.
Read at Theregister
[
add
]
[
|
|
]