Description
An arbitrary memory overwrite vulnerability in Asylo versions up to 0.6.0 allows an attacker to make a host call to FromkLinuxSockAddr with attacker controlled content and size of klinux_addr which allows an attacker to write memory values from within the enclave. We recommend upgrading past commit a37fb6a0e7daf30134dbbf357c9a518a1026aa02
Published: 2020-12-15
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

Vendor Solution

Upgrade past commit a37fb6a0e7daf30134dbbf357c9a518a1026aa02

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2020-29769 An arbitrary memory overwrite vulnerability in Asylo versions up to 0.6.0 allows an attacker to make a host call to FromkLinuxSockAddr with attacker controlled content and size of klinux_addr which allows an attacker to write memory values from within the enclave. We recommend upgrading past commit a37fb6a0e7daf30134dbbf357c9a518a1026aa02
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: Google

Published:

Updated: 2024-08-04T10:12:11.012Z

Reserved: 2020-02-12T00:00:00.000Z

Link: CVE-2020-8938

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-12-15T15:15:13.300

Modified: 2024-11-21T05:39:42.200

Link: CVE-2020-8938

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses