First published: Fri May 03 2024(Updated: )
Hardware logic with insecure de-synchronization in Intel(R) DSA and Intel(R) IAA for some Intel(R) 4th or 5th generation Xeon(R) processors may allow an authorized user to potentially enable denial of service via local access.
Credit: secure@intel.com secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux | <=5.10.223-1<=5.10.226-1 | 6.1.123-1 6.1.128-1 6.12.12-1 6.12.13-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-21823 is considered to have a moderate severity level due to potential denial of service through local access.
To fix CVE-2024-21823, update the affected 'linux' package to version 6.1.123-1 or later.
CVE-2024-21823 affects some Intel 4th and 5th generation Xeon processors.
CVE-2024-21823 cannot be exploited remotely as it requires local access for potential denial of service.
You may be vulnerable to CVE-2024-21823 if you are using the specified versions of the 'linux' package on the affected Intel processors.