{"id":"UBUNTU-CVE-2024-21808","details":"Improper buffer restrictions in some Intel(R) VPL software before version 24.1.4 may allow an authenticated user to potentially enable escalation of privilege via local access.","modified":"2025-10-24T05:06:51Z","published":"2024-11-13T21:15:00Z","upstream":["CVE-2024-21808"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-21808"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2024-21808"},{"type":"REPORT","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01131.html"}],"affected":[{"package":{"name":"intel-mediasdk","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/intel-mediasdk@20.1.0-0ubuntu1?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["19.2.1-1","19.4.0-1","19.4.0-1build1","20.1.0-0ubuntu1"],"ecosystem_specific":{"binaries":[{"binary_name":"libmfx-dev","binary_version":"20.1.0-0ubuntu1"},{"binary_name":"libmfx-tools","binary_version":"20.1.0-0ubuntu1"},{"binary_name":"libmfx1","binary_version":"20.1.0-0ubuntu1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-21808.json"}},{"package":{"name":"intel-mediasdk","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/intel-mediasdk@22.3.0-1?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["21.1.0-1","21.3.4-1","22.1.0-1","22.3.0-1"],"ecosystem_specific":{"binaries":[{"binary_name":"libmfx-dev","binary_version":"22.3.0-1"},{"binary_name":"libmfx-tools","binary_version":"22.3.0-1"},{"binary_name":"libmfx1","binary_version":"22.3.0-1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-21808.json"}},{"package":{"name":"onevpl-intel-gpu","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/onevpl-intel-gpu@22.3.2-1?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["22.2.0-1","22.3.2-1"],"ecosystem_specific":{"binaries":[{"binary_name":"libmfx-gen-dev","binary_version":"22.3.2-1"},{"binary_name":"libmfx-gen1.2","binary_version":"22.3.2-1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-21808.json"}},{"package":{"name":"intel-mediasdk","ecosystem":"Ubuntu:24.04:LTS","purl":"pkg:deb/ubuntu/intel-mediasdk@22.5.4-1?arch=source&distro=noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["22.5.4-1"],"ecosystem_specific":{"binaries":[{"binary_name":"libmfx-dev","binary_version":"22.5.4-1"},{"binary_name":"libmfx-tools","binary_version":"22.5.4-1"},{"binary_name":"libmfx1","binary_version":"22.5.4-1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-21808.json"}},{"package":{"name":"onevpl-intel-gpu","ecosystem":"Ubuntu:24.04:LTS","purl":"pkg:deb/ubuntu/onevpl-intel-gpu@23.2.3-1?arch=source&distro=noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["23.2.3-1"],"ecosystem_specific":{"binaries":[{"binary_name":"libmfx-gen-dev","binary_version":"23.2.3-1"},{"binary_name":"libmfx-gen1.2","binary_version":"23.2.3-1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-21808.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L"},{"type":"CVSS_V4","score":"CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N"},{"type":"Ubuntu","score":"medium"}]}