Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2022-23303

Опубликовано: 17 янв. 2022
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 6.8
CVSS3: 9.8

Описание

The implementations of SAE in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side channel attacks as a result of cache access patterns. NOTE: this issue exists because of an incomplete fix for CVE-2019-9494.

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
devel

not-affected

2:2.10-21
esm-infra-legacy/trusty

not-affected

code not present
esm-infra/bionic

not-affected

code not present
esm-infra/focal

released

2:2.9-1ubuntu4.6
esm-infra/xenial

not-affected

code not present
focal

released

2:2.9-1ubuntu4.6
impish

ignored

end of life
jammy

not-affected

2:2.10-6ubuntu2
kinetic

ignored

end of life, was needs-triage

Показывать по

EPSS

Процентиль: 53%
0.00301
Низкий

6.8 Medium

CVSS2

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
redhat
около 4 лет назад

The implementations of SAE in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side channel attacks as a result of cache access patterns. NOTE: this issue exists because of an incomplete fix for CVE-2019-9494.

CVSS3: 9.8
nvd
около 4 лет назад

The implementations of SAE in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side channel attacks as a result of cache access patterns. NOTE: this issue exists because of an incomplete fix for CVE-2019-9494.

CVSS3: 9.8
msrc
около 4 лет назад

Описание отсутствует

CVSS3: 9.8
debian
около 4 лет назад

The implementations of SAE in hostapd before 2.10 and wpa_supplicant b ...

CVSS3: 9.8
github
почти 4 года назад

The implementations of SAE in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side channel attacks as a result of cache access patterns. NOTE: this issue exists because of an incomplete fix for CVE-2019-9494.

EPSS

Процентиль: 53%
0.00301
Низкий

6.8 Medium

CVSS2

9.8 Critical

CVSS3