vulnerability
Oracle Linux: CVE-2022-38076: ELSA-2023-6595: linux-firmware security, bug fix, and enhancement update (IMPORTANT) (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
2 | (AV:L/AC:L/Au:S/C:N/I:P/A:N) | 2023-08-08 | 2024-07-22 | 2025-01-07 |
Severity
2
CVSS
(AV:L/AC:L/Au:S/C:N/I:P/A:N)
Published
2023-08-08
Added
2024-07-22
Modified
2025-01-07
Description
Improper input validation in some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow an authenticated user to potentially enable escalation of privilege via local access.
An improper input validation flaw was found in some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software that may allow an authenticated user to enable escalation of privilege via local access.
An improper input validation flaw was found in some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software that may allow an authenticated user to enable escalation of privilege via local access.
Solution(s)
oracle-linux-upgrade-iwl1000-firmwareoracle-linux-upgrade-iwl100-firmwareoracle-linux-upgrade-iwl105-firmwareoracle-linux-upgrade-iwl135-firmwareoracle-linux-upgrade-iwl2000-firmwareoracle-linux-upgrade-iwl2030-firmwareoracle-linux-upgrade-iwl3160-firmwareoracle-linux-upgrade-iwl3945-firmwareoracle-linux-upgrade-iwl4965-firmwareoracle-linux-upgrade-iwl5000-firmwareoracle-linux-upgrade-iwl5150-firmwareoracle-linux-upgrade-iwl6000-firmwareoracle-linux-upgrade-iwl6000g2a-firmwareoracle-linux-upgrade-iwl6000g2b-firmwareoracle-linux-upgrade-iwl6050-firmwareoracle-linux-upgrade-iwl7260-firmwareoracle-linux-upgrade-iwlax2xx-firmwareoracle-linux-upgrade-libertas-sd8686-firmwareoracle-linux-upgrade-libertas-sd8787-firmwareoracle-linux-upgrade-libertas-usb8388-firmwareoracle-linux-upgrade-libertas-usb8388-olpc-firmwareoracle-linux-upgrade-linux-firmwareoracle-linux-upgrade-linux-firmware-coreoracle-linux-upgrade-linux-firmware-whenceoracle-linux-upgrade-liquidio-firmwareoracle-linux-upgrade-netronome-firmware

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.