First published: Mon Mar 29 2021(Updated: )
An attacker can change the pointer to untrusted memory to point to trusted memory region which causes copying trusted memory to trusted memory, if the latter is later copied out, it allows for reading of memory regions from the trusted region. It is recommended to update past 0.6.2 or git commit https://github.com/google/asylo/commit/53ed5d8fd8118ced1466e509606dd2f473707a5c
Credit: cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Products | <0.6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-22548 has a medium severity rating due to the potential for unauthorized memory access.
To fix CVE-2021-22548, update Google Asylo to version 0.6.2 or later.
If exploited, CVE-2021-22548 may allow attackers to read sensitive information from trusted memory regions.
CVE-2021-22548 affects Google Asylo versions prior to 0.6.2.
There is no official workaround for CVE-2021-22548; upgrading to the latest version is recommended.