Google Asylo vulnerabilities

16 known vulnerabilities affecting google/asylo.

Total CVEs
16
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL1HIGH4MEDIUM9LOW2

Vulnerabilities

Page 1 of 1
CVE-2021-22552MEDIUMCVSS 5.5≤ 0.6.12021-08-02
CVE-2021-22552 [MEDIUM] CWE-126 CVE-2021-22552: An untrusted memory read vulnerability in Asylo versions up to 0.6.1 allows an untrusted attacker to An untrusted memory read vulnerability in Asylo versions up to 0.6.1 allows an untrusted attacker to pass a syscall number in MessageReader that is then used by sysno() and can bypass validation. This can allow the attacker to read memory from within the secure enclave. We recommend updating to Asylo 0.6.3 or past https://github.com/google/asylo/com
nvd
CVE-2021-22549HIGHCVSS 7.8fixed in 0.6.22021-06-08
CVE-2021-22549 [MEDIUM] CWE-823 CVE-2021-22549: An attacker can modify the address to point to trusted memory to overwrite arbitrary trusted memory. An attacker can modify the address to point to trusted memory to overwrite arbitrary trusted memory. It is recommended to update past 0.6.2 or git commit https://github.com/google/asylo/commit/53ed5d8fd8118ced1466e509606dd2f473707a5c
nvd
CVE-2021-22548HIGHCVSS 7.8fixed in 0.6.22021-06-08
CVE-2021-22548 [MEDIUM] CWE-788 CVE-2021-22548: An attacker can change the pointer to untrusted memory to point to trusted memory region which cause An attacker can change the pointer to untrusted memory to point to trusted memory region which causes copying trusted memory to trusted memory, if the latter is later copied out, it allows for reading of memory regions from the trusted region. It is recommended to update past 0.6.2 or git commit https://github.com/google/asylo/commit/53ed5d8fd8118ce
nvd
CVE-2021-22550HIGHCVSS 7.8fixed in 0.6.32021-06-08
CVE-2021-22550 [MEDIUM] CWE-823 CVE-2021-22550: An attacker can modify the pointers in enclave memory to overwrite arbitrary memory addresses within An attacker can modify the pointers in enclave memory to overwrite arbitrary memory addresses within the secure enclave. It is recommended to update past 0.6.3 or git commit https://github.com/google/asylo/commit/a47ef55db2337d29de19c50cd29b0deb2871d31c
nvd
CVE-2020-8935HIGHCVSS 7.8≤ 0.6.02020-12-15
CVE-2020-8935 [MEDIUM] CWE-119 CVE-2020-8935: An arbitrary memory overwrite vulnerability in Asylo versions up to 0.6.0 allow an attacker to make An arbitrary memory overwrite vulnerability in Asylo versions up to 0.6.0 allow an attacker to make an Ecall_restore function call to reallocate untrusted code and overwrite sections of the Enclave memory address. We recommend updating your library.
nvd
CVE-2020-8942MEDIUMCVSS 5.5≤ 0.6.02020-12-15
CVE-2020-8942 [MEDIUM] CWE-120 CVE-2020-8942: An arbitrary memory read vulnerability in Asylo versions up to 0.6.0 allows an untrusted attacker to An arbitrary memory read vulnerability in Asylo versions up to 0.6.0 allows an untrusted attacker to make a call to enc_untrusted_read whose return size was not validated against the requrested size. The parameter size is unchecked allowing the attacker to read memory locations outside of the intended buffer size including memory addresses within the
nvd
CVE-2020-8940MEDIUMCVSS 5.5≤ 0.6.02020-12-15
CVE-2020-8940 [MEDIUM] CWE-120 CVE-2020-8940: An arbitrary memory read vulnerability in Asylo versions up to 0.6.0 allows an untrusted attacker to An arbitrary memory read vulnerability in Asylo versions up to 0.6.0 allows an untrusted attacker to make a call to enc_untrusted_recvmsg using an attacker controlled result parameter. The parameter size is unchecked allowing the attacker to read memory locations outside of the intended buffer size including memory addresses within the secure enclave.
nvd
CVE-2020-8941MEDIUMCVSS 5.5≤ 0.6.02020-12-15
CVE-2020-8941 [MEDIUM] CWE-120 CVE-2020-8941: An arbitrary memory read vulnerability in Asylo versions up to 0.6.0 allows an untrusted attacker to An arbitrary memory read vulnerability in Asylo versions up to 0.6.0 allows an untrusted attacker to make a call to enc_untrusted_inet_pton using an attacker controlled klinux_addr_buffer parameter. The parameter size is unchecked allowing the attacker to read memory locations outside of the intended buffer size including memory addresses within the s
nvd
CVE-2020-8944MEDIUMCVSS 5.5≤ 0.6.02020-12-15
CVE-2020-8944 [MEDIUM] CWE-120 CVE-2020-8944: An arbitrary memory write vulnerability in Asylo versions up to 0.6.0 allows an untrusted attacker t An arbitrary memory write vulnerability in Asylo versions up to 0.6.0 allows an untrusted attacker to make a call to ecall_restore using the attribute output which fails to check the range of a pointer. An attacker can use this pointer to write to arbitrary memory addresses including those within the secure enclave We recommend upgrading past commit 3
nvd
CVE-2020-8943MEDIUMCVSS 5.5≤ 0.6.02020-12-15
CVE-2020-8943 [MEDIUM] CWE-120 CVE-2020-8943: An arbitrary memory read vulnerability in Asylo versions up to 0.6.0 allows an untrusted attacker to An arbitrary memory read vulnerability in Asylo versions up to 0.6.0 allows an untrusted attacker to make a call to enc_untrusted_recvfrom whose return size was not validated against the requested size. The parameter size is unchecked allowing the attacker to read memory locations outside of the intended buffer size including memory addresses within t
nvd
CVE-2020-8939MEDIUMCVSS 5.5≤ 0.6.02020-12-15
CVE-2020-8939 [MEDIUM] CWE-125 CVE-2020-8939: An out of bounds read on the enc_untrusted_inet_ntop function allows an attack to extend the result An out of bounds read on the enc_untrusted_inet_ntop function allows an attack to extend the result size that is used by memcpy() to read memory from within the enclave heap. We recommend upgrading past commit 6ff3b77ffe110a33a2f93848a6333f33616f02c4
nvd
CVE-2020-8936MEDIUMCVSS 5.5≤ 0.6.02020-12-15
CVE-2020-8936 [MEDIUM] CWE-125 CVE-2020-8936: An arbitrary memory overwrite vulnerability in Asylo versions up to 0.6.0 allows an attacker to make An arbitrary memory overwrite vulnerability in Asylo versions up to 0.6.0 allows an attacker to make a host call to UntrustedCall. UntrustedCall failed to validate the buffer range within sgx_params and allowed the host to return a pointer that was an address within the enclave memory. This allowed an attacker to read memory values from within the enc
nvd
CVE-2020-8938LOWCVSS 3.3≤ 0.6.02020-12-15
CVE-2020-8938 [MEDIUM] CWE-787 CVE-2020-8938: An arbitrary memory overwrite vulnerability in Asylo versions up to 0.6.0 allows an attacker to make An arbitrary memory overwrite vulnerability in Asylo versions up to 0.6.0 allows an attacker to make a host call to FromkLinuxSockAddr with attacker controlled content and size of klinux_addr which allows an attacker to write memory values from within the enclave. We recommend upgrading past commit a37fb6a0e7daf30134dbbf357c9a518a1026aa02
nvd
CVE-2020-8937LOWCVSS 3.3≤ 0.6.02020-12-15
CVE-2020-8937 [MEDIUM] CWE-120 CVE-2020-8937: An arbitrary memory overwrite vulnerability in Asylo versions up to 0.6.0 allows an attacker to make An arbitrary memory overwrite vulnerability in Asylo versions up to 0.6.0 allows an attacker to make a host call to enc_untrusted_create_wait_queue that uses a pointer queue that relies on UntrustedLocalMemcpy, which fails to validate where the pointer is located. This allows an attacker to write memory values from within the enclave. We recommend upg
nvd
CVE-2020-8904CRITICALCVSS 9.6fixed in 0.6.02020-08-12
CVE-2020-8904 [MEDIUM] CWE-823 CVE-2020-8904: An arbitrary memory overwrite vulnerability in the trusted memory of Asylo exists in versions prior An arbitrary memory overwrite vulnerability in the trusted memory of Asylo exists in versions prior to 0.6.0. As the ecall_restore function fails to validate the range of the output_len pointer, an attacker can manipulate the tmp_output_len value and write to an arbitrary location in the trusted (enclave) memory. We recommend updating Asylo to version
nvd
CVE-2020-8905MEDIUMCVSS 6.5fixed in 0.6.02020-08-12
CVE-2020-8905 [LOW] CWE-120 CVE-2020-8905: A buffer length validation vulnerability in Asylo versions prior to 0.6.0 allows an attacker to read A buffer length validation vulnerability in Asylo versions prior to 0.6.0 allows an attacker to read data they should not have access to. The 'enc_untrusted_recvfrom' function generates a return value which is deserialized by 'MessageReader', and copied into three different 'extents'. The length of the third 'extents' is controlled by the outside world,
nvd
Google Asylo vulnerabilities | cvebase