Skip to content

Intel Processor MMIO Stale Data Vulnerabilities

Moderate
radhikaj published GHSA-9338-hvw4-gwp8 Jun 14, 2022

Package

open-enclave (Linux, Windows)

Affected versions

<0.18.0

Patched versions

0.18.0

Description

Impact

On affected Intel CPUs, a partial write (smaller than 8 byte or non-8-byte aligned) to the host memory from an SGX enclave allows the malicious host to use the vulnerabilities to read enclave data (i.e., the stale data inside CPU buffers). Note that these vulnerabilities are introduced by hardware bugs rather than bugs in software or in the Open Enclave SDK.

Patches

The mitigation consists of hardware and software updates. For the former, users will need to ensure the processor microcode is update-to-dated. The latter has been included in version 0.18.0 and the current master branch. Users will need to regenerate the marshaling code with the new oeedger8r tool and recompile their applications against the patched libraries to be protected from this vulnerability. In addition, users may need to manually patch their source code if it includes vulnerable code patterns that bypass the provided protection. Please refer to the document for more detail.

Workarounds

There are no workarounds for this issue.

References

Intel Security Advisory: INTEL-SA-00615

For more information

If you have any questions or comments about this advisory:

Severity

Moderate

CVE ID

CVE-2022-21166

Weaknesses

No CWEs