CVE-2024-21820

Publication date 13 November 2024

Last updated 11 December 2024


Ubuntu priority

Incorrect default permissions in some Intel(R) Xeon(R) processor memory controller configurations when using Intel(R) SGX may allow a privileged user to potentially enable escalation of privilege via local access.

From the Ubuntu Security Team

Avraham Shalev and Nagaraju N Kodalapura discovered that some Intel(R) Xeon(R) processors did not properly restrict access to the memory controller when using Intel(R) SGX. This may allow a local privileged attacker to further escalate their privileges.

Status

Package Ubuntu Release Status
intel-microcode 24.10 oracular
Fixed 3.20241112.0ubuntu0.24.10.1
24.04 LTS noble
Fixed 3.20241112.0ubuntu0.24.04.1
22.04 LTS jammy
Fixed 3.20241112.0ubuntu0.22.04.1
20.04 LTS focal
Fixed 3.20241112.0ubuntu0.20.04.1
18.04 LTS bionic
16.04 LTS xenial
14.04 LTS trusty Ignored end of ESM support, was ignored [trusty doesn't support late loading of microcode]

Get expanded security coverage with Ubuntu Pro

Reduce your average CVE exposure time from 98 days to 1 day with expanded CVE patching, ten-years security maintenance and optional support for the full stack of open-source applications. Free for personal use.

Get Ubuntu Pro