Vulnerability Description
An attacker can change the pointer to untrusted memory to point to trusted memory region which causes copying trusted memory to trusted memory, if the latter is later copied out, it allows for reading of memory regions from the trusted region. It is recommended to update past 0.6.2 or git commit https://github.com/google/asylo/commit/53ed5d8fd8118ced1466e509606dd2f473707a5c
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Asylo | < 0.6.2 |
Related Weaknesses (CWE)
References
- https://github.com/google/asylo/commit/53ed5d8fd8118ced1466e509606dd2f473707a5cPatchThird Party Advisory
- https://github.com/google/asylo/commit/53ed5d8fd8118ced1466e509606dd2f473707a5cPatchThird Party Advisory
FAQ
What is CVE-2021-22548?
CVE-2021-22548 is a vulnerability with a CVSS score of 6.5 (MEDIUM). An attacker can change the pointer to untrusted memory to point to trusted memory region which causes copying trusted memory to trusted memory, if the latter is later copied out, it allows for reading...
How severe is CVE-2021-22548?
CVE-2021-22548 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-22548?
Check the references section above for vendor advisories and patch information. Affected products include: Google Asylo.