Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-21823

Опубликовано: 16 мая 2024
Источник: debian

Описание

Hardware logic with insecure de-synchronization in Intel(R) DSA and Intel(R) IAA for some Intel(R) 4th or 5th generation Xeon(R) processors may allow an authorized user to potentially enable escalation of privilege local access

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed6.8.11-1package
linuxfixed6.1.94-1bookwormpackage
linuxnot-affectedbusterpackage

Примечания

  • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01084.html

  • https://git.kernel.org/linus/95feb3160eef0caa6018e175a5560b816aee8e79 (6.10-rc1)

  • https://git.kernel.org/linus/e11452eb071b2a8e6ba52892b2e270bbdaa6640d (6.10-rc1)

  • https://git.kernel.org/linus/6827738dc684a87ad54ebba3ae7f3d7c977698eb (6.10-rc1)

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 1 года назад

Hardware logic with insecure de-synchronization in Intel(R) DSA and Intel(R) IAA for some Intel(R) 4th or 5th generation Xeon(R) processors may allow an authorized user to potentially enable escalation of privilege local access

CVSS3: 6.4
redhat
больше 1 года назад

Hardware logic with insecure de-synchronization in Intel(R) DSA and Intel(R) IAA for some Intel(R) 4th or 5th generation Xeon(R) processors may allow an authorized user to potentially enable escalation of privilege local access

CVSS3: 7.5
nvd
больше 1 года назад

Hardware logic with insecure de-synchronization in Intel(R) DSA and Intel(R) IAA for some Intel(R) 4th or 5th generation Xeon(R) processors may allow an authorized user to potentially enable escalation of privilege local access

CVSS3: 6.4
github
больше 1 года назад

Hardware logic with insecure de-synchronization in Intel(R) DSA and Intel(R) IAA for some Intel(R) 4th or 5th generation Xeon(R) processors may allow an authorized user to potentially enable denial of service via local access.

CVSS3: 7.5
fstec
больше 1 года назад

Уязвимость функции vfio_pci_dev_in_denylist() ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на целостность и доступность защищаемой информации