CVE-2024-23918

Name
CVE-2024-23918
Description
Improper conditions check in some Intel(R) Xeon(R) processor memory controller configurations when using Intel(R) SGX may allow a privileged user to potentially enable escalation of privilege via local access.
NVD Severity
high
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01079.html
af854a3a-2127-422b-91ae-364da2661108 https://lists.debian.org/debian-lts-announce/2024/12/msg00024.html

Match rules

CPE URI Source package Min version Max version
intel(r)-xeon(r)-processor-memory-controller-configurations-when-using-intel(r)-sgx == See references == See references

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
intel-ucode edge-main 20241112-r0 Marian Buschsieweke <marian.buschsieweke@posteo.net> fixed
intel-ucode 3.22-main 20241112-r0 None fixed
intel-ucode 3.21-main 20241112-r0 Marian Buschsieweke <marian.buschsieweke@posteo.net> fixed
intel-ucode 3.20-main 20241112-r0 Marian Buschsieweke <marian.buschsieweke@posteo.net> fixed
intel-ucode 3.19-main 20241112-r0 Marian Buschsieweke <marian.buschsieweke@posteo.net> fixed
intel-ucode 3.18-main 20241112-r0 Marian Buschsieweke <marian.buschsieweke@posteo.net> fixed
intel-ucode 3.17-main 20241112-r0 Marian Buschsieweke <marian.buschsieweke@posteo.net> fixed