An arbitrary memory write vulnerability in Asylo versions up to 0.6.0 allows an untrusted attacker to make a call to ecall_restore using the attribute output which fails to check the range of a pointer. An attacker can use this pointer to write to arbitrary memory addresses including those within the secure enclave We recommend upgrading past commit 382da2b8b09cbf928668a2445efb778f76bd9c8a
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-8944.json"
[
{
"source": "https://github.com/google/asylo/commit/382da2b8b09cbf928668a2445efb778f76bd9c8a",
"digest": {
"length": 677.0,
"function_hash": "292544041043139605901666954554142880038"
},
"signature_version": "v1",
"deprecated": false,
"signature_type": "Function",
"target": {
"file": "asylo/platform/primitives/sgx/ecalls.cc",
"function": "ecall_restore"
},
"id": "CVE-2020-8944-c4bb674b"
},
{
"source": "https://github.com/google/asylo/commit/382da2b8b09cbf928668a2445efb778f76bd9c8a",
"digest": {
"line_hashes": [
"43796465893664919794037350362535671537",
"52328078366487823200871823319078263788",
"304446741389288734818625786649112460004",
"48016510177646431537891352573878220813"
],
"threshold": 0.9
},
"signature_version": "v1",
"deprecated": false,
"signature_type": "Line",
"target": {
"file": "asylo/platform/primitives/sgx/ecalls.cc"
},
"id": "CVE-2020-8944-ebc3eb05"
}
]