7.1 High
CVSS3
Attack Vector
ADJACENT_NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
4.3 Medium
CVSS2
Access Vector
ADJACENT_NETWORK
Access Complexity
HIGH
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:A/AC:H/Au:N/C:P/I:P/A:P
0.002 Low
EPSS
Percentile
51.3%
An issue was found in Linux kernel before 5.5.4.
mwifiex_ret_wmm_get_status() in drivers/net/wireless/marvell/mwifiex/wmm.c
allows a remote AP to trigger a heap-based buffer overflow because of an
incorrect memcpy, aka CID-3a9b153c5591.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 14.04 | noarch | linux-aws | < 4.4.0-1065.69) Available with Ubuntu Pro or Ubuntu Pro (Infra-only | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | < 4.15.0-1065.69 | UNKNOWN |
ubuntu | 19.10 | noarch | linux-aws | < 5.3.0-1017.18 | UNKNOWN |
ubuntu | 16.04 | noarch | linux-aws | < 4.4.0-1105.116 | UNKNOWN |
ubuntu | 14.04 | noarch | linux-lts-xenial | < 4.4.0-177.207~14.04.1) Available with Ubuntu Pro or Ubuntu Pro (Infra-only | UNKNOWN |
ubuntu | 14.04 | noarch | linux-azure | < 4.15.0-1077.82~14.04.1) Available with Ubuntu Pro or Ubuntu Pro (Infra-only | UNKNOWN |
ubuntu | 19.10 | noarch | linux-azure | < 5.3.0-1020.21 | UNKNOWN |
ubuntu | 16.04 | noarch | linux-azure | < 4.15.0-1077.82 | UNKNOWN |
ubuntu | 18.04 | noarch | linux | < 4.15.0-96.97 | UNKNOWN |
ubuntu | 19.10 | noarch | linux | < 5.3.0-51.44 | UNKNOWN |
cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.5.4
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12654
git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=3a9b153c5591548612c3955c9600a98150c81875
git.kernel.org/linus/3a9b153c5591548612c3955c9600a98150c81875 (5.6-rc1)
github.com/torvalds/linux/commit/3a9b153c5591548612c3955c9600a98150c81875
launchpad.net/bugs/cve/CVE-2020-12654
nvd.nist.gov/vuln/detail/CVE-2020-12654
security-tracker.debian.org/tracker/CVE-2020-12654
ubuntu.com/security/notices/USN-4392-1
ubuntu.com/security/notices/USN-4393-1
7.1 High
CVSS3
Attack Vector
ADJACENT_NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
4.3 Medium
CVSS2
Access Vector
ADJACENT_NETWORK
Access Complexity
HIGH
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:A/AC:H/Au:N/C:P/I:P/A:P
0.002 Low
EPSS
Percentile
51.3%