6.5 Medium
CVSS3
Attack Vector
ADJACENT_NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
3.3 Low
CVSS2
Access Vector
ADJACENT_NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:A/AC:L/Au:N/C:N/I:N/A:P
kernel is vulnerable to denial of service (DoS). The vulnerability exists by triggering AP to send IAPP location updates for stations before the required authentication process has completed.
packetstormsecurity.com/files/156455/Kernel-Live-Patch-Security-Notice-LSN-0063-1.html
access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.2_release_notes/index
access.redhat.com/errata/RHSA-2020:1769
access.redhat.com/security/updates/classification/#important
bugzilla.redhat.com/show_bug.cgi?id=1789927
git.kernel.org/linus/3e493173b7841259a08c5c8e5cbe90adb349da7e
lists.debian.org/debian-lts-announce/2020/06/msg00011.html
lists.debian.org/debian-lts-announce/2020/06/msg00012.html
lists.debian.org/debian-lts-announce/2020/06/msg00013.html
security.netapp.com/advisory/ntap-20200204-0002/
talosintelligence.com/vulnerability_reports/TALOS-2019-0900
usn.ubuntu.com/4285-1/
usn.ubuntu.com/4286-1/
usn.ubuntu.com/4286-2/
usn.ubuntu.com/4287-1/
usn.ubuntu.com/4287-2/
www.debian.org/security/2020/dsa-4698
www.oracle.com/security-alerts/cpuApr2021.html
6.5 Medium
CVSS3
Attack Vector
ADJACENT_NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
3.3 Low
CVSS2
Access Vector
ADJACENT_NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:A/AC:L/Au:N/C:N/I:N/A:P