vulnerability
Oracle Linux: CVE-2022-38076: ELSA-2023-6595: linux-firmware security, bug fix, and enhancement update (IMPORTANT) (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
2 | (AV:L/AC:L/Au:S/C:N/I:P/A:N) | 08/08/2023 | 07/22/2024 | 01/07/2025 |
Severity
2
CVSS
(AV:L/AC:L/Au:S/C:N/I:P/A:N)
Published
08/08/2023
Added
07/22/2024
Modified
01/07/2025
Description
Improper input validation in some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software may allow an authenticated user to potentially enable escalation of privilege via local access.
An improper input validation flaw was found in some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software that may allow an authenticated user to enable escalation of privilege via local access.
An improper input validation flaw was found in some Intel(R) PROSet/Wireless WiFi and Killer(TM) WiFi software that may allow an authenticated user to enable escalation of privilege via local access.
Solution(s)
oracle-linux-upgrade-iwl1000-firmwareoracle-linux-upgrade-iwl100-firmwareoracle-linux-upgrade-iwl105-firmwareoracle-linux-upgrade-iwl135-firmwareoracle-linux-upgrade-iwl2000-firmwareoracle-linux-upgrade-iwl2030-firmwareoracle-linux-upgrade-iwl3160-firmwareoracle-linux-upgrade-iwl3945-firmwareoracle-linux-upgrade-iwl4965-firmwareoracle-linux-upgrade-iwl5000-firmwareoracle-linux-upgrade-iwl5150-firmwareoracle-linux-upgrade-iwl6000-firmwareoracle-linux-upgrade-iwl6000g2a-firmwareoracle-linux-upgrade-iwl6000g2b-firmwareoracle-linux-upgrade-iwl6050-firmwareoracle-linux-upgrade-iwl7260-firmwareoracle-linux-upgrade-iwlax2xx-firmwareoracle-linux-upgrade-libertas-sd8686-firmwareoracle-linux-upgrade-libertas-sd8787-firmwareoracle-linux-upgrade-libertas-usb8388-firmwareoracle-linux-upgrade-libertas-usb8388-olpc-firmwareoracle-linux-upgrade-linux-firmwareoracle-linux-upgrade-linux-firmware-coreoracle-linux-upgrade-linux-firmware-whenceoracle-linux-upgrade-liquidio-firmwareoracle-linux-upgrade-netronome-firmware

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.