vulnerability
Oracle Linux: CVE-2022-36351: ELSA-2023-6595: linux-firmware security, bug fix, and enhancement update (IMPORTANT) (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
3 | (AV:A/AC:L/Au:N/C:N/I:N/A:P) | 2023-08-08 | 2024-07-22 | 2025-01-07 |
Severity
3
CVSS
(AV:A/AC:L/Au:N/C:N/I:N/A:P)
Published
2023-08-08
Added
2024-07-22
Modified
2025-01-07
Description
Improper input validation in some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow an unauthenticated user to potentially enable denial of service via adjacent access.
An improper input validation flaw was found in some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software that may allow an unauthenticated user to enable a denial of service via adjacent access.
An improper input validation flaw was found in some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software that may allow an unauthenticated user to enable a denial of service via adjacent access.
Solution(s)
oracle-linux-upgrade-iwl1000-firmwareoracle-linux-upgrade-iwl100-firmwareoracle-linux-upgrade-iwl105-firmwareoracle-linux-upgrade-iwl135-firmwareoracle-linux-upgrade-iwl2000-firmwareoracle-linux-upgrade-iwl2030-firmwareoracle-linux-upgrade-iwl3160-firmwareoracle-linux-upgrade-iwl3945-firmwareoracle-linux-upgrade-iwl4965-firmwareoracle-linux-upgrade-iwl5000-firmwareoracle-linux-upgrade-iwl5150-firmwareoracle-linux-upgrade-iwl6000-firmwareoracle-linux-upgrade-iwl6000g2a-firmwareoracle-linux-upgrade-iwl6000g2b-firmwareoracle-linux-upgrade-iwl6050-firmwareoracle-linux-upgrade-iwl7260-firmwareoracle-linux-upgrade-iwlax2xx-firmwareoracle-linux-upgrade-libertas-sd8686-firmwareoracle-linux-upgrade-libertas-sd8787-firmwareoracle-linux-upgrade-libertas-usb8388-firmwareoracle-linux-upgrade-libertas-usb8388-olpc-firmwareoracle-linux-upgrade-linux-firmwareoracle-linux-upgrade-linux-firmware-coreoracle-linux-upgrade-linux-firmware-whenceoracle-linux-upgrade-liquidio-firmwareoracle-linux-upgrade-netronome-firmware

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.