Improper input validation in some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow an authenticated user to potentially enable escalation of privilege via local access.
References
Link | Resource |
---|---|
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html | Patch Vendor Advisory |
https://lists.debian.org/debian-lts-announce/2023/09/msg00043.html | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HUCYUR4WBTELCRHELISJ3RMZVHKIV5TN/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K24OJT4AVMNND7LBTC2ZDDTE6DJHAKB4/ | Mailing List |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y76A3PLHIQCEPESB4XVBV5SRRXQEZ5JY/ | Mailing List |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: intel
Published: 2023-08-11T02:36:55.105Z
Updated: 2023-08-11T02:36:55.105Z
Reserved: 2022-08-10T03:00:25.306Z
Link: CVE-2022-38076
JSON object: View
NVD Information
Status : Modified
Published: 2023-08-11T03:15:13.843
Modified: 2023-11-07T03:50:00.173
Link: CVE-2022-38076
JSON object: View
Redhat Information
No data.
CWE