Bug 2238961 (CVE-2022-46329) - CVE-2022-46329 hw: intel: Protection mechanism failure for some Intel(R) PROSet/Wireless WiFi
Summary: CVE-2022-46329 hw: intel: Protection mechanism failure for some Intel(R) PROS...
Keywords:
Status: NEW
Alias: CVE-2022-46329
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2239142
Blocks: 2238972
TreeView+ depends on / blocked
 
Reported: 2023-09-14 14:46 UTC by Pedro Sampaio
Modified: 2024-04-30 14:50 UTC (History)
8 users (show)

Fixed In Version: linux-firmware-20230804
Doc Type: If docs needed, set a value
Doc Text:
Protection mechanism failure for some Intel(R) PROSet/Wireless WiFi software may allow a privileged user to enable escalation of privilege via local access.
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2023:6595 0 None None None 2023-11-07 08:20:51 UTC
Red Hat Product Errata RHSA-2024:0449 0 None None None 2024-01-24 16:39:49 UTC
Red Hat Product Errata RHSA-2024:0577 0 None None None 2024-01-30 13:24:17 UTC
Red Hat Product Errata RHSA-2024:1112 0 None None None 2024-03-05 15:04:14 UTC
Red Hat Product Errata RHSA-2024:2583 0 None None None 2024-04-30 14:50:40 UTC

Description Pedro Sampaio 2023-09-14 14:46:12 UTC
Protection mechanism failure for some Intel(R) PROSet/Wireless WiFi software may allow a privileged user to potentially enable escalation of privilege via local access.

References:

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00766.html

Comment 2 Pedro Sampaio 2023-09-15 13:39:41 UTC
Created linux-firmware tracking bugs for this issue:

Affects: fedora-all [bug 2239142]

Comment 8 errata-xmlrpc 2023-11-07 08:20:50 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2023:6595 https://access.redhat.com/errata/RHSA-2023:6595

Comment 15 errata-xmlrpc 2024-01-24 16:39:48 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Extended Update Support

Via RHSA-2024:0449 https://access.redhat.com/errata/RHSA-2024:0449

Comment 16 errata-xmlrpc 2024-01-30 13:24:16 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Extended Update Support

Via RHSA-2024:0577 https://access.redhat.com/errata/RHSA-2024:0577

Comment 18 errata-xmlrpc 2024-03-05 15:04:13 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Extended Update Support

Via RHSA-2024:1112 https://access.redhat.com/errata/RHSA-2024:1112

Comment 22 errata-xmlrpc 2024-04-30 14:50:39 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.4 Telecommunications Update Service

Via RHSA-2024:2583 https://access.redhat.com/errata/RHSA-2024:2583


Note You need to log in before you can comment on or make changes to this bug.