An attacker can change the pointer to untrusted memory to point to trusted memory region which causes copying trusted memory to trusted memory, if the latter is later copied out, it allows for reading of memory regions from the trusted region. It is recommended to update past 0.6.2 or git commit https://github.com/google/asylo/commit/53ed5d8fd8118ced1466e509606dd2f473707a5c
References
Link | Resource |
---|---|
https://github.com/google/asylo/commit/53ed5d8fd8118ced1466e509606dd2f473707a5c | Patch Third Party Advisory |
https://github.com/google/asylo/commit/53ed5d8fd8118ced1466e509606dd2f473707a5c | Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 05:50
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/google/asylo/commit/53ed5d8fd8118ced1466e509606dd2f473707a5c - Patch, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 4.6
v3 : 6.5 |
Information
Published : 2021-06-08 14:15
Updated : 2024-11-21 05:50
NVD link : CVE-2021-22548
Mitre link : CVE-2021-22548
CVE.ORG link : CVE-2021-22548
JSON object : View
Products Affected
- asylo
CWE