CVE-2021-24117

In Apache Teaclave Rust SGX SDK 1.1.3, a side-channel vulnerability in base64 PEM file decoding allows system-level (administrator) attackers to obtain information about secret RSA keys via a controlled-channel and side-channel attack on software running in isolated environments that can be single stepped, especially Intel SGX.
Configurations

Configuration 1 (hide)

cpe:2.3:a:apache:teaclave_sgx_sdk:1.1.3:*:*:*:*:rust:*:*

History

21 Nov 2024, 05:52

Type Values Removed Values Added
References () https://docs.rs/crate/sgx_tstd/1.1.1 - Product, Third Party Advisory () https://docs.rs/crate/sgx_tstd/1.1.1 - Product, Third Party Advisory
References () https://github.com/UzL-ITS/util-lookup/blob/main/cve-vulnerability-publication.md - Patch, Third Party Advisory () https://github.com/UzL-ITS/util-lookup/blob/main/cve-vulnerability-publication.md - Patch, Third Party Advisory
References () https://github.com/dingelish/rust-base64/commit/a554b7ae880553db6dde8a387101a093911d5b2a - Issue Tracking, Patch, Third Party Advisory () https://github.com/dingelish/rust-base64/commit/a554b7ae880553db6dde8a387101a093911d5b2a - Issue Tracking, Patch, Third Party Advisory

Information

Published : 2021-07-14 14:15

Updated : 2024-11-21 05:52


NVD link : CVE-2021-24117

Mitre link : CVE-2021-24117

CVE.ORG link : CVE-2021-24117


JSON object : View

Products Affected

apache

  • teaclave_sgx_sdk
CWE
CWE-203

Observable Discrepancy