CVE-2024-23918

Name
CVE-2024-23918
Description
Improper conditions check in some Intel(R) Xeon(R) processor memory controller configurations when using Intel(R) SGX may allow a privileged user to potentially enable escalation of privilege via local access.
NVD Severity
high
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01079.html

Match rules

CPE URI Source package Min version Max version
intel(r)-xeon(r)-processor-memory-controller-configurations-when-using-intel(r)-sgx == See references == See references
cpe:2.3:h:intel:3rd_generation_intel_xeon_scalable_processor_family:606a6:*:*:*:*:*:*:* 3rd-generation-intel-xeon-scalable-processor-family == 606A6 == 606A6
cpe:2.3:h:intel:4th_generation_intel_xeon_processor_scalable_family:806f7:*:*:*:*:*:*:* 4th-generation-intel-xeon-processor-scalable-family == 806f7 == 806f7
cpe:2.3:h:intel:4th_generation_intel_xeon_processor_scalable_family:806f8:*:*:*:*:*:*:* 4th-generation-intel-xeon-processor-scalable-family == 806f8 == 806f8
cpe:2.3:h:intel:5th_generation_intel_xeon_processor_scalable_family:c06f2:*:*:*:*:*:*:* 5th-generation-intel-xeon-processor-scalable-family == c06f2 == c06f2
cpe:2.3:h:intel:xeon_d_processor:606c1:*:*:*:*:*:*:* xeon-d-processor == 606C1 == 606C1

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
intel-ucode edge-main 20241112-r0 Marian Buschsieweke <marian.buschsieweke@posteo.net> fixed
intel-ucode 3.20-main 20241112-r0 Marian Buschsieweke <marian.buschsieweke@posteo.net> fixed
intel-ucode 3.19-main 20241112-r0 Marian Buschsieweke <marian.buschsieweke@posteo.net> fixed
intel-ucode 3.18-main 20241112-r0 Marian Buschsieweke <marian.buschsieweke@posteo.net> fixed
intel-ucode 3.17-main 20241112-r0 Marian Buschsieweke <marian.buschsieweke@posteo.net> fixed
intel-ucode 3.21-main 20241112-r0 Marian Buschsieweke <marian.buschsieweke@posteo.net> fixed