CVE-2024-21823

NameCVE-2024-21823
DescriptionHardware logic with insecure de-synchronization in Intel(R) DSA and Intel(R) IAA for some Intel(R) 4th or 5th generation Xeon(R) processors may allow an authorized user to potentially enable escalation of privilege local access
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
linux (PTS)jessie, jessie (lts)3.16.84-1vulnerable
stretch (security)4.9.320-2vulnerable
stretch (lts), stretch4.9.320-3vulnerable
buster (security), buster, buster (lts)4.19.316-1fixed
bullseye (security), bullseye5.10.223-1vulnerable
bookworm6.1.106-3fixed
bookworm (security)6.1.99-1fixed
trixie6.10.6-1fixed
sid6.10.7-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
linuxsourcejessie(unfixed)end-of-life
linuxsourcestretch(unfixed)end-of-life
linuxsourcebuster(not affected)
linuxsourcebookworm6.1.94-1
linuxsource(unstable)6.8.11-1

Notes

[buster] - linux <not-affected> (Vulnerable code not present)
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01084.html
https://git.kernel.org/linus/95feb3160eef0caa6018e175a5560b816aee8e79 (6.10-rc1)
https://git.kernel.org/linus/e11452eb071b2a8e6ba52892b2e270bbdaa6640d (6.10-rc1)
https://git.kernel.org/linus/6827738dc684a87ad54ebba3ae7f3d7c977698eb (6.10-rc1)

Search for package or bug name: Reporting problems