Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-23304

Опубликовано: 17 янв. 2022
Источник: debian
EPSS Низкий

Описание

The implementations of EAP-pwd in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side-channel attacks as a result of cache access patterns. NOTE: this issue exists because of an incomplete fix for CVE-2019-9495.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
wpafixed2:2.10-1package
wpano-dsabusterpackage
wpaignoredstretchpackage

Примечания

  • https://w1.fi/security/2022-1/

  • Issue exists because of an incomplete fix for CVE-2019-9495

EPSS

Процентиль: 17%
0.00056
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 4 лет назад

The implementations of EAP-pwd in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side-channel attacks as a result of cache access patterns. NOTE: this issue exists because of an incomplete fix for CVE-2019-9495.

CVSS3: 7
redhat
около 4 лет назад

The implementations of EAP-pwd in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side-channel attacks as a result of cache access patterns. NOTE: this issue exists because of an incomplete fix for CVE-2019-9495.

CVSS3: 9.8
nvd
около 4 лет назад

The implementations of EAP-pwd in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side-channel attacks as a result of cache access patterns. NOTE: this issue exists because of an incomplete fix for CVE-2019-9495.

CVSS3: 9.8
msrc
около 4 лет назад

Описание отсутствует

CVSS3: 9.8
github
почти 4 года назад

The implementations of EAP-pwd in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side-channel attacks as a result of cache access patterns. NOTE: this issue exists because of an incomplete fix for CVE-2019-9495.

EPSS

Процентиль: 17%
0.00056
Низкий