Description
An arbitrary memory write vulnerability in Asylo versions up to 0.6.0 allows an untrusted attacker to make a call to ecall_restore using the attribute output which fails to check the range of a pointer. An attacker can use this pointer to write to arbitrary memory addresses including those within the secure enclave We recommend upgrading past commit 382da2b8b09cbf928668a2445efb778f76bd9c8a
No analysis available yet.
Remediation
Vendor Solution
We recommend upgrading past commit 382da2b8b09cbf928668a2445efb778f76bd9c8a
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-29775 | An arbitrary memory write vulnerability in Asylo versions up to 0.6.0 allows an untrusted attacker to make a call to ecall_restore using the attribute output which fails to check the range of a pointer. An attacker can use this pointer to write to arbitrary memory addresses including those within the secure enclave We recommend upgrading past commit 382da2b8b09cbf928668a2445efb778f76bd9c8a |
References
History
No history.
Status: PUBLISHED
Assigner: Google
Published:
Updated: 2024-08-04T10:12:10.992Z
Reserved: 2020-02-12T00:00:00.000Z
Link: CVE-2020-8944
No data.
Status : Modified
Published: 2020-12-15T15:15:13.707
Modified: 2024-11-21T05:39:42.833
Link: CVE-2020-8944
No data.
OpenCVE Enrichment
No data.
EUVD