Advisory Database
  • Advisories
  • Dependency Scanning
  1. nuget
  2. ›
  3. open-enclave
  4. ›
  5. CVE-2020-15107

CVE-2020-15107: Covert Channel

July 15, 2020 (updated July 22, 2020)

In openenclave, enclaves that use x87 FPU operations are vulnerable to tampering by a malicious host application. By violating the Linux System V Application Binary Interface (ABI) for such operations, a host app can compromise the execution integrity of some x87 FPU operations in an enclave. Depending on the FPU control configuration of the enclave app and whether the operations are used in secret-dependent execution paths, this vulnerability may also be used to mount a side-channel attack on the enclave.

References

  • nvd.nist.gov/vuln/detail/CVE-2020-15107

Code Behaviors & Features

Detect and mitigate CVE-2020-15107 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 0.10.0

Fixed versions

  • 0.10.0

Solution

Upgrade to version 0.10.0 or above.

Impact 5.3 MEDIUM

CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:H/A:N

Learn more about CVSS

Source file

nuget/open-enclave/CVE-2020-15107.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:22 +0000.