First published: Tue Apr 03 2018(Updated: )
AESM daemon in Intel Software Guard Extensions Platform Software Component for Linux before 2.1.102 can effectively be disabled by a local attacker creating a denial of services like remote attestation provided by the AESM.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
Intel Software Guard Extensions | ||
Linux kernel | <2.1.102 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-3689 is considered a high severity vulnerability as it can allow local attackers to disable critical denial of service features.
To fix CVE-2018-3689, update Intel Software Guard Extensions Platform Software Component for Linux to version 2.1.102 or later.
CVE-2018-3689 affects users of Intel Software Guard Extensions on Linux systems that have the vulnerable software version installed.
CVE-2018-3689 exploits a flaw in the AESM daemon that can lead to a denial of service for remote attestation.
As of now, applying the available software updates is the most effective recommended workaround for CVE-2018-3689.