First published: Tue Dec 15 2020(Updated: )
An arbitrary memory overwrite vulnerability in Asylo versions up to 0.6.0 allows an attacker to make a host call to FromkLinuxSockAddr with attacker controlled content and size of klinux_addr which allows an attacker to write memory values from within the enclave. We recommend upgrading past commit a37fb6a0e7daf30134dbbf357c9a518a1026aa02
Credit: cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Products | <=0.6.0 |
Upgrade past commit a37fb6a0e7daf30134dbbf357c9a518a1026aa02
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-8938 is classified as a high severity vulnerability due to its potential for arbitrary memory overwrite.
To remediate CVE-2020-8938, upgrade to Asylo version 0.7.0 or later, as earlier versions are affected.
CVE-2020-8938 affects Google Asylo versions up to and including 0.6.0.
CVE-2020-8938 is an arbitrary memory overwrite vulnerability that allows attackers to manipulate memory from within the enclave.
Yes, CVE-2020-8938 can be exploited remotely if an attacker has the ability to make host calls with controlled input.