Количество 11
Количество 11
CVE-2022-23303
The implementations of SAE in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side channel attacks as a result of cache access patterns. NOTE: this issue exists because of an incomplete fix for CVE-2019-9494.
CVE-2022-23303
The implementations of SAE in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side channel attacks as a result of cache access patterns. NOTE: this issue exists because of an incomplete fix for CVE-2019-9494.
CVE-2022-23303
The implementations of SAE in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side channel attacks as a result of cache access patterns. NOTE: this issue exists because of an incomplete fix for CVE-2019-9494.
CVE-2022-23303
CVE-2022-23303
The implementations of SAE in hostapd before 2.10 and wpa_supplicant b ...
GHSA-8v55-rm6p-87p5
The implementations of SAE in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side channel attacks as a result of cache access patterns. NOTE: this issue exists because of an incomplete fix for CVE-2019-9494.
BDU:2022-07363
Уязвимость реализации SAE клиента защищённого доступа Wi-Fi WPA Supplicant, связанная с раскрытием информации через несоответствие, позволяющая нарушителю раскрыть защищаемую информацию
openSUSE-SU-2022:0716-1
Security update for wpa_supplicant
SUSE-SU-2022:0716-1
Security update for wpa_supplicant
SUSE-SU-2022:0504-1
Security update for wpa_supplicant
SUSE-SU-2022:1853-1
Security update for wpa_supplicant
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2022-23303 The implementations of SAE in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side channel attacks as a result of cache access patterns. NOTE: this issue exists because of an incomplete fix for CVE-2019-9494. | CVSS3: 9.8 | 0% Низкий | около 4 лет назад | |
CVE-2022-23303 The implementations of SAE in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side channel attacks as a result of cache access patterns. NOTE: this issue exists because of an incomplete fix for CVE-2019-9494. | CVSS3: 9.8 | 0% Низкий | около 4 лет назад | |
CVE-2022-23303 The implementations of SAE in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side channel attacks as a result of cache access patterns. NOTE: this issue exists because of an incomplete fix for CVE-2019-9494. | CVSS3: 9.8 | 0% Низкий | около 4 лет назад | |
CVSS3: 9.8 | 0% Низкий | около 4 лет назад | ||
CVE-2022-23303 The implementations of SAE in hostapd before 2.10 and wpa_supplicant b ... | CVSS3: 9.8 | 0% Низкий | около 4 лет назад | |
GHSA-8v55-rm6p-87p5 The implementations of SAE in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side channel attacks as a result of cache access patterns. NOTE: this issue exists because of an incomplete fix for CVE-2019-9494. | CVSS3: 9.8 | 0% Низкий | почти 4 года назад | |
BDU:2022-07363 Уязвимость реализации SAE клиента защищённого доступа Wi-Fi WPA Supplicant, связанная с раскрытием информации через несоответствие, позволяющая нарушителю раскрыть защищаемую информацию | CVSS3: 9.8 | 0% Низкий | около 4 лет назад | |
openSUSE-SU-2022:0716-1 Security update for wpa_supplicant | почти 4 года назад | |||
SUSE-SU-2022:0716-1 Security update for wpa_supplicant | почти 4 года назад | |||
SUSE-SU-2022:0504-1 Security update for wpa_supplicant | почти 4 года назад | |||
SUSE-SU-2022:1853-1 Security update for wpa_supplicant | больше 3 лет назад |
Уязвимостей на страницу