Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-21823

Опубликовано: 16 мая 2024
Источник: debian

Описание

Hardware logic with insecure de-synchronization in Intel(R) DSA and Intel(R) IAA for some Intel(R) 4th or 5th generation Xeon(R) processors may allow an authorized user to potentially enable escalation of privilege local access

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed6.8.11-1package
linuxfixed6.1.94-1bookwormpackage
linuxnot-affectedbusterpackage

Примечания

  • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01084.html

  • https://git.kernel.org/linus/95feb3160eef0caa6018e175a5560b816aee8e79 (6.10-rc1)

  • https://git.kernel.org/linus/e11452eb071b2a8e6ba52892b2e270bbdaa6640d (6.10-rc1)

  • https://git.kernel.org/linus/6827738dc684a87ad54ebba3ae7f3d7c977698eb (6.10-rc1)

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 1 года назад

Hardware logic with insecure de-synchronization in Intel(R) DSA and Intel(R) IAA for some Intel(R) 4th or 5th generation Xeon(R) processors may allow an authorized user to potentially enable denial of service via local access.

CVSS3: 6.4
redhat
около 1 года назад

Hardware logic with insecure de-synchronization in Intel(R) DSA and Intel(R) IAA for some Intel(R) 4th or 5th generation Xeon(R) processors may allow an authorized user to potentially enable escalation of privilege local access

CVSS3: 7.5
nvd
около 1 года назад

Hardware logic with insecure de-synchronization in Intel(R) DSA and Intel(R) IAA for some Intel(R) 4th or 5th generation Xeon(R) processors may allow an authorized user to potentially enable escalation of privilege local access

CVSS3: 6.4
github
около 1 года назад

Hardware logic with insecure de-synchronization in Intel(R) DSA and Intel(R) IAA for some Intel(R) 4th or 5th generation Xeon(R) processors may allow an authorized user to potentially enable denial of service via local access.

CVSS3: 7.5
fstec
около 1 года назад

Уязвимость функции vfio_pci_dev_in_denylist() ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на целостность и доступность защищаемой информации