An arbitrary memory overwrite vulnerability in the trusted memory of Asylo exists in versions prior to 0.6.0. As the ecall_restore function fails to validate the range of the output_len pointer, an attacker can manipulate the tmp_output_len value and write to an arbitrary location in the trusted (enclave) memory. We recommend updating Asylo to version 0.6.0 or later.
References
Link | Resource |
---|---|
https://github.com/google/asylo/commit/e582f36ac49ee11a21d23ad6a30c333092e0a94e | Patch Third Party Advisory |
Configurations
History
No history.
Information
Published : 2020-08-12 19:15
Updated : 2024-02-04 21:00
NVD link : CVE-2020-8904
Mitre link : CVE-2020-8904
CVE.ORG link : CVE-2020-8904
JSON object : View
Products Affected
- asylo