vulnerability
Oracle Linux: CVE-2022-36351: ELSA-2023-6595: linux-firmware security, bug fix, and enhancement update (IMPORTANT) (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
3 | (AV:A/AC:L/Au:N/C:N/I:N/A:P) | 08/08/2023 | 07/22/2024 | 01/07/2025 |
Severity
3
CVSS
(AV:A/AC:L/Au:N/C:N/I:N/A:P)
Published
08/08/2023
Added
07/22/2024
Modified
01/07/2025
Description
Improper input validation in some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow an unauthenticated user to potentially enable denial of service via adjacent access.
An improper input validation flaw was found in some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software that may allow an unauthenticated user to enable a denial of service via adjacent access.
An improper input validation flaw was found in some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software that may allow an unauthenticated user to enable a denial of service via adjacent access.
Solution(s)
oracle-linux-upgrade-iwl1000-firmwareoracle-linux-upgrade-iwl100-firmwareoracle-linux-upgrade-iwl105-firmwareoracle-linux-upgrade-iwl135-firmwareoracle-linux-upgrade-iwl2000-firmwareoracle-linux-upgrade-iwl2030-firmwareoracle-linux-upgrade-iwl3160-firmwareoracle-linux-upgrade-iwl3945-firmwareoracle-linux-upgrade-iwl4965-firmwareoracle-linux-upgrade-iwl5000-firmwareoracle-linux-upgrade-iwl5150-firmwareoracle-linux-upgrade-iwl6000-firmwareoracle-linux-upgrade-iwl6000g2a-firmwareoracle-linux-upgrade-iwl6000g2b-firmwareoracle-linux-upgrade-iwl6050-firmwareoracle-linux-upgrade-iwl7260-firmwareoracle-linux-upgrade-iwlax2xx-firmwareoracle-linux-upgrade-libertas-sd8686-firmwareoracle-linux-upgrade-libertas-sd8787-firmwareoracle-linux-upgrade-libertas-usb8388-firmwareoracle-linux-upgrade-libertas-usb8388-olpc-firmwareoracle-linux-upgrade-linux-firmwareoracle-linux-upgrade-linux-firmware-coreoracle-linux-upgrade-linux-firmware-whenceoracle-linux-upgrade-liquidio-firmwareoracle-linux-upgrade-netronome-firmware

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.