Количество 11
Количество 11
CVE-2022-23304
The implementations of EAP-pwd in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side-channel attacks as a result of cache access patterns. NOTE: this issue exists because of an incomplete fix for CVE-2019-9495.
CVE-2022-23304
The implementations of EAP-pwd in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side-channel attacks as a result of cache access patterns. NOTE: this issue exists because of an incomplete fix for CVE-2019-9495.
CVE-2022-23304
The implementations of EAP-pwd in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side-channel attacks as a result of cache access patterns. NOTE: this issue exists because of an incomplete fix for CVE-2019-9495.
CVE-2022-23304
CVE-2022-23304
The implementations of EAP-pwd in hostapd before 2.10 and wpa_supplica ...
GHSA-fwqr-qx2m-vqxq
The implementations of EAP-pwd in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side-channel attacks as a result of cache access patterns. NOTE: this issue exists because of an incomplete fix for CVE-2019-9495.
BDU:2022-07364
Уязвимость реализации EAP-pwd клиента защищённого доступа Wi-Fi WPA Supplicant, связанная с раскрытием информации через несоответствие, позволяющая нарушителю раскрыть защищаемую информацию
openSUSE-SU-2022:0716-1
Security update for wpa_supplicant
SUSE-SU-2022:0716-1
Security update for wpa_supplicant
SUSE-SU-2022:0504-1
Security update for wpa_supplicant
SUSE-SU-2022:1853-1
Security update for wpa_supplicant
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2022-23304 The implementations of EAP-pwd in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side-channel attacks as a result of cache access patterns. NOTE: this issue exists because of an incomplete fix for CVE-2019-9495. | CVSS3: 9.8 | 0% Низкий | около 4 лет назад | |
CVE-2022-23304 The implementations of EAP-pwd in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side-channel attacks as a result of cache access patterns. NOTE: this issue exists because of an incomplete fix for CVE-2019-9495. | CVSS3: 7 | 0% Низкий | около 4 лет назад | |
CVE-2022-23304 The implementations of EAP-pwd in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side-channel attacks as a result of cache access patterns. NOTE: this issue exists because of an incomplete fix for CVE-2019-9495. | CVSS3: 9.8 | 0% Низкий | около 4 лет назад | |
CVSS3: 9.8 | 0% Низкий | около 4 лет назад | ||
CVE-2022-23304 The implementations of EAP-pwd in hostapd before 2.10 and wpa_supplica ... | CVSS3: 9.8 | 0% Низкий | около 4 лет назад | |
GHSA-fwqr-qx2m-vqxq The implementations of EAP-pwd in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side-channel attacks as a result of cache access patterns. NOTE: this issue exists because of an incomplete fix for CVE-2019-9495. | CVSS3: 9.8 | 0% Низкий | почти 4 года назад | |
BDU:2022-07364 Уязвимость реализации EAP-pwd клиента защищённого доступа Wi-Fi WPA Supplicant, связанная с раскрытием информации через несоответствие, позволяющая нарушителю раскрыть защищаемую информацию | CVSS3: 9.8 | 0% Низкий | около 4 лет назад | |
openSUSE-SU-2022:0716-1 Security update for wpa_supplicant | почти 4 года назад | |||
SUSE-SU-2022:0716-1 Security update for wpa_supplicant | почти 4 года назад | |||
SUSE-SU-2022:0504-1 Security update for wpa_supplicant | почти 4 года назад | |||
SUSE-SU-2022:1853-1 Security update for wpa_supplicant | больше 3 лет назад |
Уязвимостей на страницу