Improper input validation in the Linux kernel mode driver for some Intel(R) Ethernet Network Controllers and Adapters before version 28.3 may allow an authenticated user to potentially enable escalation of privilege via local access.
Metrics
Affected Vendors & Products
References
History
Wed, 14 Aug 2024 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Intel
Intel ethernet Complete Driver Pack |
|
CPEs | cpe:2.3:a:intel:ethernet_complete_driver_pack:*:*:*:*:*:*:*:* | |
Vendors & Products |
Intel
Intel ethernet Complete Driver Pack |
|
Metrics |
ssvc
|
Wed, 14 Aug 2024 14:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Improper input validation in the Linux kernel mode driver for some Intel(R) Ethernet Network Controllers and Adapters before version 28.3 may allow an authenticated user to potentially enable escalation of privilege via local access. | |
Weaknesses | CWE-20 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: intel
Published: 2024-08-14T13:45:43.577Z
Updated: 2024-08-16T04:01:25.878Z
Reserved: 2024-02-14T04:00:11.441Z
Link: CVE-2024-21810
Vulnrichment
Updated: 2024-08-14T14:25:04.363Z
NVD
Status : Awaiting Analysis
Published: 2024-08-14T14:15:17.167
Modified: 2024-08-14T17:49:14.177
Link: CVE-2024-21810
Redhat
No data.