7.1 High
CVSS3
Attack Vector
ADJACENT_NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
4.3 Medium
CVSS2
Access Vector
ADJACENT_NETWORK
Access Complexity
HIGH
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:A/AC:H/Au:N/C:P/I:P/A:P
kernel is vulnerable to arbitrary code execution. A heap-based buffer overflow in the mwifiex_ret_wmm_get_status
function in drivers/net/wireless/marvell/mwifiex/wmm.c
allows an attacker to execute arbitrary code on the system.
lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html
www.openwall.com/lists/oss-security/2020/05/08/2
access.redhat.com/errata/RHSA-2020:2832
access.redhat.com/security/updates/classification/#important
access.redhat.com/solutions/5142691
cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.5.4
git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=3a9b153c5591548612c3955c9600a98150c81875
github.com/torvalds/linux/commit/3a9b153c5591548612c3955c9600a98150c81875
lists.debian.org/debian-lts-announce/2020/06/msg00011.html
lists.debian.org/debian-lts-announce/2020/06/msg00012.html
lists.debian.org/debian-lts-announce/2020/06/msg00013.html
security.netapp.com/advisory/ntap-20200608-0001/
usn.ubuntu.com/4392-1/
usn.ubuntu.com/4393-1/
www.debian.org/security/2020/dsa-4698
7.1 High
CVSS3
Attack Vector
ADJACENT_NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
4.3 Medium
CVSS2
Access Vector
ADJACENT_NETWORK
Access Complexity
HIGH
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:A/AC:H/Au:N/C:P/I:P/A:P