First published: Tue Jun 08 2021(Updated: )
An attacker can modify the address to point to trusted memory to overwrite arbitrary trusted memory. It is recommended to update past 0.6.2 or git commit https://github.com/google/asylo/commit/53ed5d8fd8118ced1466e509606dd2f473707a5c
Credit: cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Asylo | <0.6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.