Количество 12
Количество 12
CVE-2019-9494
The implementations of SAE in hostapd and wpa_supplicant are vulnerable to side channel attacks as a result of observable timing differences and cache access patterns. An attacker may be able to gain leaked information from a side channel attack that can be used for full password recovery. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.7 are affected.
CVE-2019-9494
The implementations of SAE in hostapd and wpa_supplicant are vulnerable to side channel attacks as a result of observable timing differences and cache access patterns. An attacker may be able to gain leaked information from a side channel attack that can be used for full password recovery. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.7 are affected.
CVE-2019-9494
The implementations of SAE in hostapd and wpa_supplicant are vulnerable to side channel attacks as a result of observable timing differences and cache access patterns. An attacker may be able to gain leaked information from a side channel attack that can be used for full password recovery. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.7 are affected.
CVE-2019-9494
The implementations of SAE in hostapd and wpa_supplicant are vulnerabl ...
GHSA-cvqc-p7v4-m9pm
The implementations of SAE in hostapd and wpa_supplicant are vulnerable to side channel attacks as a result of observable timing differences and cache access patterns. An attacker may be able to gain leaked information from a side channel attack that can be used for full password recovery. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.7 are affected.
BDU:2021-05846
Уязвимость реализации SAE функции wpa_supplicant сертификации устройств беспроводной связи WPA, связанная с раскрытием информации, позволяющая нарушителю получить доступ к конфиденциальным данным
openSUSE-SU-2020:0222-1
Security update for hostapd
SUSE-SU-2020:3424-1
Security update for wpa_supplicant
SUSE-SU-2022:1853-1
Security update for wpa_supplicant
openSUSE-SU-2020:2059-1
Security update for wpa_supplicant
openSUSE-SU-2020:2053-1
Security update for wpa_supplicant
SUSE-SU-2020:3380-1
Security update for wpa_supplicant
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2019-9494 The implementations of SAE in hostapd and wpa_supplicant are vulnerable to side channel attacks as a result of observable timing differences and cache access patterns. An attacker may be able to gain leaked information from a side channel attack that can be used for full password recovery. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.7 are affected. | CVSS3: 5.9 | 1% Низкий | почти 7 лет назад | |
CVE-2019-9494 The implementations of SAE in hostapd and wpa_supplicant are vulnerable to side channel attacks as a result of observable timing differences and cache access patterns. An attacker may be able to gain leaked information from a side channel attack that can be used for full password recovery. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.7 are affected. | CVSS3: 7 | 1% Низкий | почти 7 лет назад | |
CVE-2019-9494 The implementations of SAE in hostapd and wpa_supplicant are vulnerable to side channel attacks as a result of observable timing differences and cache access patterns. An attacker may be able to gain leaked information from a side channel attack that can be used for full password recovery. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.7 are affected. | CVSS3: 5.9 | 1% Низкий | почти 7 лет назад | |
CVE-2019-9494 The implementations of SAE in hostapd and wpa_supplicant are vulnerabl ... | CVSS3: 5.9 | 1% Низкий | почти 7 лет назад | |
GHSA-cvqc-p7v4-m9pm The implementations of SAE in hostapd and wpa_supplicant are vulnerable to side channel attacks as a result of observable timing differences and cache access patterns. An attacker may be able to gain leaked information from a side channel attack that can be used for full password recovery. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.7 are affected. | CVSS3: 5.9 | 1% Низкий | больше 3 лет назад | |
BDU:2021-05846 Уязвимость реализации SAE функции wpa_supplicant сертификации устройств беспроводной связи WPA, связанная с раскрытием информации, позволяющая нарушителю получить доступ к конфиденциальным данным | CVSS3: 5.9 | 1% Низкий | почти 7 лет назад | |
openSUSE-SU-2020:0222-1 Security update for hostapd | почти 6 лет назад | |||
SUSE-SU-2020:3424-1 Security update for wpa_supplicant | около 5 лет назад | |||
SUSE-SU-2022:1853-1 Security update for wpa_supplicant | больше 3 лет назад | |||
openSUSE-SU-2020:2059-1 Security update for wpa_supplicant | около 5 лет назад | |||
openSUSE-SU-2020:2053-1 Security update for wpa_supplicant | около 5 лет назад | |||
SUSE-SU-2020:3380-1 Security update for wpa_supplicant | около 5 лет назад |
Уязвимостей на страницу