Impact
On affected Intel CPUs, a partial write (smaller than 8 byte or non-8-byte aligned) to the host memory from an SGX enclave allows the malicious host to use the vulnerabilities to read enclave data (i.e., the stale data inside CPU buffers). Note that these vulnerabilities are introduced by hardware bugs rather than bugs in software or in the Open Enclave SDK.
Patches
The mitigation consists of hardware and software updates. For the former, users will need to ensure the processor microcode is update-to-dated. The latter has been included in version 0.18.0 and the current master branch. Users will need to regenerate the marshaling code with the new oeedger8r tool and recompile their applications against the patched libraries to be protected from this vulnerability. In addition, users may need to manually patch their source code if it includes vulnerable code patterns that bypass the provided protection. Please refer to the document for more detail.
Workarounds
There are no workarounds for this issue.
References
Intel Security Advisory: INTEL-SA-00615
For more information
If you have any questions or comments about this advisory:
Impact
On affected Intel CPUs, a partial write (smaller than 8 byte or non-8-byte aligned) to the host memory from an SGX enclave allows the malicious host to use the vulnerabilities to read enclave data (i.e., the stale data inside CPU buffers). Note that these vulnerabilities are introduced by hardware bugs rather than bugs in software or in the Open Enclave SDK.
Patches
The mitigation consists of hardware and software updates. For the former, users will need to ensure the processor microcode is update-to-dated. The latter has been included in version 0.18.0 and the current master branch. Users will need to regenerate the marshaling code with the new oeedger8r tool and recompile their applications against the patched libraries to be protected from this vulnerability. In addition, users may need to manually patch their source code if it includes vulnerable code patterns that bypass the provided protection. Please refer to the document for more detail.
Workarounds
There are no workarounds for this issue.
References
Intel Security Advisory: INTEL-SA-00615
For more information
If you have any questions or comments about this advisory:
question
label.