CVE-2018-3689

AESM daemon in Intel Software Guard Extensions Platform Software Component for Linux before 2.1.102 can effectively be disabled by a local attacker creating a denial of services like remote attestation provided by the AESM.
References
Link Resource
https://cdrdv2.intel.com/v1/dl/getContent/685355 Broken Link Vendor Advisory
https://cdrdv2.intel.com/v1/dl/getContent/685355 Broken Link Vendor Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:intel:software_guard_extensions:-:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:05

Type Values Removed Values Added
References () https://cdrdv2.intel.com/v1/dl/getContent/685355 - Broken Link, Vendor Advisory () https://cdrdv2.intel.com/v1/dl/getContent/685355 - Broken Link, Vendor Advisory

Information

Published : 2018-04-03 16:29

Updated : 2024-11-21 04:05


NVD link : CVE-2018-3689

Mitre link : CVE-2018-3689

CVE.ORG link : CVE-2018-3689


JSON object : View

Products Affected

intel

  • software_guard_extensions

linux

  • linux_kernel