An arbitrary memory read vulnerability in Asylo versions up to 0.6.0 allows an untrusted attacker to make a call to enc_untrusted_recvmsg using an attacker controlled result parameter. The parameter size is unchecked allowing the attacker to read memory locations outside of the intended buffer size including memory addresses within the secure enclave. We recommend upgrading or past commit fa6485c5d16a7355eab047d4a44345a73bc9131e
References
Link | Resource |
---|---|
https://github.com/google/asylo/commit/fa6485c5d16a7355eab047d4a44345a73bc9131e | Patch Third Party Advisory |
https://github.com/google/asylo/commit/fa6485c5d16a7355eab047d4a44345a73bc9131e | Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 05:39
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/google/asylo/commit/fa6485c5d16a7355eab047d4a44345a73bc9131e - Patch, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 2.1
v3 : 5.3 |
Information
Published : 2020-12-15 15:15
Updated : 2024-11-21 05:39
NVD link : CVE-2020-8940
Mitre link : CVE-2020-8940
CVE.ORG link : CVE-2020-8940
JSON object : View
Products Affected
- asylo