An arbitrary memory overwrite vulnerability in the trusted memory of Asylo exists in versions prior to 0.6.0. As the ecall_restore function fails to validate the range of the output_len pointer, an attacker can manipulate the tmp_output_len value and write to an arbitrary location in the trusted (enclave) memory. We recommend updating Asylo to version 0.6.0 or later.
References
Link | Resource |
---|---|
https://github.com/google/asylo/commit/e582f36ac49ee11a21d23ad6a30c333092e0a94e | Patch Third Party Advisory |
https://github.com/google/asylo/commit/e582f36ac49ee11a21d23ad6a30c333092e0a94e | Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 05:39
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 5.5
v3 : 6.4 |
References | () https://github.com/google/asylo/commit/e582f36ac49ee11a21d23ad6a30c333092e0a94e - Patch, Third Party Advisory |
Information
Published : 2020-08-12 19:15
Updated : 2024-11-21 05:39
NVD link : CVE-2020-8904
Mitre link : CVE-2020-8904
CVE.ORG link : CVE-2020-8904
JSON object : View
Products Affected
- asylo