First published: Thu Jun 13 2019(Updated: )
Insufficient input validation in the Intel(R) SGX driver for Linux may allow an authenticated user to potentially enable a denial of service via local access.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
Intel Software Guard Extensions | <2.5 | |
Intel Software Guard Extensions Data Center Attestation Primitives | <1.1 | |
Linux kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-0157 has a medium severity rating due to its potential to enable denial of service by authenticated users.
To fix CVE-2019-0157, it is recommended to update to the latest version of the Intel Software Guard Extensions that is beyond version 2.5.
CVE-2019-0157 affects users of Intel Software Guard Extensions and Data Center Attestation Primitives on vulnerable versions.
CVE-2019-0157 requires local access for exploitation, making it less of a concern for remote attackers.
The potential consequences of CVE-2019-0157 include denial of service to applications utilizing the affected Intel SGX driver.