ID

VAR-202105-1430


CVE

CVE-2020-26139


TITLE

NetBSD  of   Authentication vulnerability in kernel

Trust: 0.8

sources: JVNDB: JVNDB-2021-006884

DESCRIPTION

An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients. NetBSD of An authentication vulnerability exists in the kernel.Service operation interruption (DoS) It may be in a state. This update provides the corresponding updates for the Linux KVM kernel for Ubuntu 21.04. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Moderate: Openshift Logging Security Release (5.0.10) Advisory ID: RHSA-2021:5137-01 Product: Red Hat OpenShift Enterprise Advisory URL: https://access.redhat.com/errata/RHSA-2021:5137 Issue date: 2021-12-14 CVE Names: CVE-2018-20673 CVE-2018-25009 CVE-2018-25010 CVE-2018-25012 CVE-2018-25013 CVE-2018-25014 CVE-2019-5827 CVE-2019-13750 CVE-2019-13751 CVE-2019-14615 CVE-2019-17594 CVE-2019-17595 CVE-2019-18218 CVE-2019-19603 CVE-2019-20838 CVE-2020-0427 CVE-2020-10001 CVE-2020-12762 CVE-2020-13435 CVE-2020-14145 CVE-2020-14155 CVE-2020-16135 CVE-2020-17541 CVE-2020-24370 CVE-2020-24502 CVE-2020-24503 CVE-2020-24504 CVE-2020-24586 CVE-2020-24587 CVE-2020-24588 CVE-2020-26139 CVE-2020-26140 CVE-2020-26141 CVE-2020-26143 CVE-2020-26144 CVE-2020-26145 CVE-2020-26146 CVE-2020-26147 CVE-2020-27777 CVE-2020-29368 CVE-2020-29660 CVE-2020-35448 CVE-2020-35521 CVE-2020-35522 CVE-2020-35523 CVE-2020-35524 CVE-2020-36158 CVE-2020-36312 CVE-2020-36330 CVE-2020-36331 CVE-2020-36332 CVE-2020-36386 CVE-2021-0129 CVE-2021-3200 CVE-2021-3348 CVE-2021-3426 CVE-2021-3445 CVE-2021-3481 CVE-2021-3487 CVE-2021-3489 CVE-2021-3564 CVE-2021-3572 CVE-2021-3573 CVE-2021-3580 CVE-2021-3600 CVE-2021-3635 CVE-2021-3659 CVE-2021-3679 CVE-2021-3712 CVE-2021-3732 CVE-2021-3778 CVE-2021-3796 CVE-2021-3800 CVE-2021-20194 CVE-2021-20197 CVE-2021-20231 CVE-2021-20232 CVE-2021-20239 CVE-2021-20266 CVE-2021-20284 CVE-2021-22876 CVE-2021-22898 CVE-2021-22925 CVE-2021-23133 CVE-2021-23840 CVE-2021-23841 CVE-2021-27645 CVE-2021-28153 CVE-2021-28950 CVE-2021-28971 CVE-2021-29155 CVE-2021-29646 CVE-2021-29650 CVE-2021-31440 CVE-2021-31535 CVE-2021-31829 CVE-2021-31916 CVE-2021-33033 CVE-2021-33200 CVE-2021-33560 CVE-2021-33574 CVE-2021-35942 CVE-2021-36084 CVE-2021-36085 CVE-2021-36086 CVE-2021-36087 CVE-2021-42574 CVE-2021-43527 CVE-2021-44228 ==================================================================== 1. Summary: Openshift Logging Security Release (5.0.10) Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Description: Openshift Logging Bug Fix Release (5.0.10) Security Fix(es): * log4j-core: Remote code execution in Log4j 2.x when logs contain an attacker-controlled string value (CVE-2021-44228) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 3. Solution: For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update: https://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html For Red Hat OpenShift Logging 5.0, see the following instructions to apply this update: https://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html 4. Bugs fixed (https://bugzilla.redhat.com/): 2030932 - CVE-2021-44228 log4j-core: Remote code execution in Log4j 2.x when logs contain an attacker-controlled string value 5. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYblJCtzjgjWX9erEAQh6fQ/+KcGXg9BZNi8DLq8vkmNl+2bNGhNurPgd H51g3gapqOBgTQvcQ14/S70cPgXZFxBTARxGzBJMr16eEaDsuYFieGkjofh00ixi RPNnjWZ2Stm6KEE0+a+/LpDfe+mID1F+Hi/px5zj5duRcMNNbrSZiOkGEpOoem8L LGvbRwFVTTM90euRUf4GfNctHHhtlk21u8xIJ9wBle4LXe7Px4S7pe89qp5KOTRc hau3qqWRDexLO6JPCOpp71APsNxy+S+OxeHid0CyoXtXjCzkAYcQ1FVhjvmF2QzR LFu79nur4VG06eDbQd5fZAf3K3lzVIbjj1pPV1yTY20hSpwM+X9rOLOJH5O5yPh3 dNDhTudFRTQ3hBQgc4M8bh4nsq5fTl+OWMdmortAvBPViPacI/DopRjcGaFXAyNq cYCdYoiEL4fXwWjt7KI4VCJuGiIa7aKNq4kaJjAboGKRrT6t4aLv/5Kpmco200kq IANqA5gkrb9FKjMNzG9/ktbLgwiaz17xM7X0E71FM3hsl50BJvY/+jCbeRP5QdSO RqkGUotZ/kxlUSZR9hx7wy0foDH0U8vpa6/VEppCCCBOIE1m0vbhkGuzesgu9yM0 GhZMfw0UsOJzTBejKXJ8fxhgioZIHe6gisBAewy15FNKvWGZqJ0OlR80Tnruc/h/ pGz6uNWwB3s=IMvs -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce . ========================================================================== Ubuntu Security Notice USN-5343-1 March 22, 2022 linux, linux-aws, linux-kvm, linux-lts-xenial vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 16.04 ESM - Ubuntu 14.04 ESM Summary: Several security issues were fixed in the Linux kernel. Software Description: - linux: Linux kernel - linux-aws: Linux kernel for Amazon Web Services (AWS) systems - linux-kvm: Linux kernel for cloud environments - linux-lts-xenial: Linux hardware enablement kernel from Xenial for Trusty Details: Yiqi Sun and Kevin Wang discovered that the cgroups implementation in the Linux kernel did not properly restrict access to the cgroups v1 release_agent feature. A local attacker could use this to gain administrative privileges. (CVE-2022-0492) It was discovered that the aufs file system in the Linux kernel did not properly restrict mount namespaces, when mounted with the non-default allow_userns option set. A local attacker could use this to gain administrative privileges. (CVE-2016-2853) It was discovered that the aufs file system in the Linux kernel did not properly maintain POSIX ACL xattr data, when mounted with the non-default allow_userns option. A local attacker could possibly use this to gain elevated privileges. (CVE-2016-2854) It was discovered that the f2fs file system in the Linux kernel did not properly validate metadata in some situations. An attacker could use this to construct a malicious f2fs image that, when mounted and operated on, could cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-19449) It was discovered that the XFS file system implementation in the Linux kernel did not properly validate meta data in some circumstances. An attacker could use this to construct a malicious XFS image that, when mounted, could cause a denial of service. (CVE-2020-12655) Kiyin (尹亮) discovered that the NFC LLCP protocol implementation in the Linux kernel contained a reference counting error. A local attacker could use this to cause a denial of service (system crash). (CVE-2020-25670) Kiyin (尹亮) discovered that the NFC LLCP protocol implementation in the Linux kernel did not properly deallocate memory in certain error situations. A local attacker could use this to cause a denial of service (memory exhaustion). (CVE-2020-25671, CVE-2020-25672) Kiyin (尹亮) discovered that the NFC LLCP protocol implementation in the Linux kernel did not properly handle error conditions in some situations, leading to an infinite loop. A local attacker could use this to cause a denial of service. (CVE-2020-25673) Mathy Vanhoef discovered that the Linux kernel’s WiFi implementation incorrectly handled EAPOL frames from unauthenticated senders. A physically proximate attacker could inject malicious packets to cause a denial of service (system crash). (CVE-2020-26139) Mathy Vanhoef discovered that the Linux kernel’s WiFi implementation could reassemble mixed encrypted and plaintext fragments. A physically proximate attacker could possibly use this issue to inject packets or exfiltrate selected fragments. (CVE-2020-26147) It was discovered that the BR/EDR pin-code pairing procedure in the Linux kernel was vulnerable to an impersonation attack. A physically proximate attacker could possibly use this to pair to a device without knowledge of the pin-code. (CVE-2020-26555) It was discovered that the bluetooth subsystem in the Linux kernel did not properly perform access control. An authenticated attacker could possibly use this to expose sensitive information. (CVE-2020-26558, CVE-2021-0129) It was discovered that the FUSE user space file system implementation in the Linux kernel did not properly handle bad inodes in some situations. A local attacker could possibly use this to cause a denial of service. (CVE-2020-36322) It was discovered that the Infiniband RDMA userspace connection manager implementation in the Linux kernel contained a race condition leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possible execute arbitrary code. (CVE-2020-36385) It was discovered that the DRM subsystem in the Linux kernel contained double-free vulnerabilities. A privileged attacker could possibly use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-20292) It was discovered that a race condition existed in the timer implementation in the Linux kernel. A privileged attacker could use this to cause a denial of service. (CVE-2021-20317) Or Cohen and Nadav Markus discovered a use-after-free vulnerability in the nfc implementation in the Linux kernel. A privileged local attacker could use this issue to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-23134) It was discovered that the Xen paravirtualization backend in the Linux kernel did not properly deallocate memory in some situations. A local attacker could use this to cause a denial of service (memory exhaustion). (CVE-2021-28688) It was discovered that the RPA PCI Hotplug driver implementation in the Linux kernel did not properly handle device name writes via sysfs, leading to a buffer overflow. A privileged attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-28972) It was discovered that a race condition existed in the netfilter subsystem of the Linux kernel when replacing tables. A local attacker could use this to cause a denial of service (system crash). (CVE-2021-29650) It was discovered that a race condition in the kernel Bluetooth subsystem could lead to use-after-free of slab objects. An attacker could use this issue to possibly execute arbitrary code. (CVE-2021-32399) It was discovered that the CIPSO implementation in the Linux kernel did not properly perform reference counting in some situations, leading to use- after-free vulnerabilities. An attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-33034) Asaf Modelevsky discovered that the Intel(R) Ethernet ixgbe driver for the Linux kernel did not properly validate large MTU requests from Virtual Function (VF) devices. A local attacker could possibly use this to cause a denial of service. (CVE-2021-33098) Norbert Slusarek discovered that the CAN broadcast manger (bcm) protocol implementation in the Linux kernel did not properly initialize memory in some situations. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2021-34693) 马哲宇 discovered that the IEEE 1394 (Firewire) nosy packet sniffer driver in the Linux kernel did not properly perform reference counting in some situations, leading to a use-after-free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-3483) It was discovered that an out-of-bounds (OOB) memory access flaw existed in the f2fs module of the Linux kernel. A local attacker could use this issue to cause a denial of service (system crash). (CVE-2021-3506) It was discovered that the bluetooth subsystem in the Linux kernel did not properly handle HCI device initialization failure, leading to a double-free vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2021-3564) It was discovered that the bluetooth subsystem in the Linux kernel did not properly handle HCI device detach events, leading to a use-after-free vulnerability. An attacker could use this to cause a denial of service or possibly execute arbitrary code. (CVE-2021-3573) Murray McAllister discovered that the joystick device interface in the Linux kernel did not properly validate data passed via an ioctl(). A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code on systems with a joystick device registered. (CVE-2021-3612) It was discovered that the tracing subsystem in the Linux kernel did not properly keep track of per-cpu ring buffer state. A privileged attacker could use this to cause a denial of service. (CVE-2021-3679) It was discovered that the Virtio console implementation in the Linux kernel did not properly validate input lengths in some situations. A local attacker could possibly use this to cause a denial of service (system crash). (CVE-2021-38160) It was discovered that the KVM hypervisor implementation in the Linux kernel did not properly compute the access permissions for shadow pages in some situations. A local attacker could use this to cause a denial of service. (CVE-2021-38198) It was discovered that the MAX-3421 host USB device driver in the Linux kernel did not properly handle device removal events. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2021-38204) It was discovered that the NFC implementation in the Linux kernel did not properly handle failed connect events leading to a NULL pointer dereference. A local attacker could use this to cause a denial of service. (CVE-2021-38208) It was discovered that the configfs interface for USB gadgets in the Linux kernel contained a race condition. A local attacker could possibly use this to expose sensitive information (kernel memory). (CVE-2021-39648) It was discovered that the ext4 file system in the Linux kernel contained a race condition when writing xattrs to an inode. A local attacker could use this to cause a denial of service or possibly gain administrative privileges. (CVE-2021-40490) It was discovered that the 6pack network protocol driver in the Linux kernel did not properly perform validation checks. A privileged attacker could use this to cause a denial of service (system crash) or execute arbitrary code. (CVE-2021-42008) It was discovered that the ISDN CAPI implementation in the Linux kernel contained a race condition in certain situations that could trigger an array out-of-bounds bug. A privileged local attacker could possibly use this to cause a denial of service or execute arbitrary code. (CVE-2021-43389) It was discovered that the Phone Network protocol (PhoNet) implementation in the Linux kernel did not properly perform reference counting in some error conditions. A local attacker could possibly use this to cause a denial of service (memory exhaustion). (CVE-2021-45095) Wenqing Liu discovered that the f2fs file system in the Linux kernel did not properly validate the last xattr entry in an inode. An attacker could use this to construct a malicious f2fs image that, when mounted and operated on, could cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-45469) Amit Klein discovered that the IPv6 implementation in the Linux kernel could disclose internal state in some situations. An attacker could possibly use this to expose sensitive information. (CVE-2021-45485) It was discovered that the per cpu memory allocator in the Linux kernel could report kernel pointers via dmesg. An attacker could use this to expose sensitive information or in conjunction with another kernel vulnerability. (CVE-2018-5995) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 16.04 ESM: linux-image-4.4.0-1103-kvm 4.4.0-1103.112 linux-image-4.4.0-1138-aws 4.4.0-1138.152 linux-image-4.4.0-222-generic 4.4.0-222.255 linux-image-4.4.0-222-lowlatency 4.4.0-222.255 linux-image-aws 4.4.0.1138.143 linux-image-generic 4.4.0.222.229 linux-image-kvm 4.4.0.1103.101 linux-image-lowlatency 4.4.0.222.229 linux-image-virtual 4.4.0.222.229 Ubuntu 14.04 ESM: linux-image-4.4.0-1102-aws 4.4.0-1102.107 linux-image-4.4.0-222-generic 4.4.0-222.255~14.04.1 linux-image-4.4.0-222-lowlatency 4.4.0-222.255~14.04.1 linux-image-aws 4.4.0.1102.100 linux-image-generic-lts-xenial 4.4.0.222.193 linux-image-lowlatency-lts-xenial 4.4.0.222.193 linux-image-virtual-lts-xenial 4.4.0.222.193 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References: https://ubuntu.com/security/notices/USN-5343-1 CVE-2016-2853, CVE-2016-2854, CVE-2018-5995, CVE-2019-19449, CVE-2020-12655, CVE-2020-25670, CVE-2020-25671, CVE-2020-25672, CVE-2020-25673, CVE-2020-26139, CVE-2020-26147, CVE-2020-26555, CVE-2020-26558, CVE-2020-36322, CVE-2020-36385, CVE-2021-0129, CVE-2021-20292, CVE-2021-20317, CVE-2021-23134, CVE-2021-28688, CVE-2021-28972, CVE-2021-29650, CVE-2021-32399, CVE-2021-33033, CVE-2021-33034, CVE-2021-33098, CVE-2021-34693, CVE-2021-3483, CVE-2021-3506, CVE-2021-3564, CVE-2021-3573, CVE-2021-3612, CVE-2021-3679, CVE-2021-38160, CVE-2021-38198, CVE-2021-38204, CVE-2021-38208, CVE-2021-39648, CVE-2021-40490, CVE-2021-42008, CVE-2021-43389, CVE-2021-45095, CVE-2021-45469, CVE-2021-45485, CVE-2022-0492

Trust: 2.43

sources: NVD: CVE-2020-26139 // JVNDB: JVNDB-2021-006884 // VULMON: CVE-2020-26139 // PACKETSTORM: 163249 // PACKETSTORM: 163251 // PACKETSTORM: 163255 // PACKETSTORM: 163291 // PACKETSTORM: 163301 // PACKETSTORM: 163599 // PACKETSTORM: 165296 // PACKETSTORM: 166417

AFFECTED PRODUCTS

vendor:ciscomodel:meraki mr12scope:eqversion: -

Trust: 1.0

vendor:aristamodel:c-75scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:meraki mx67cwscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:aironet 1852scope:eqversion: -

Trust: 1.0

vendor:intelmodel:proset wi-fi 6 ax200scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:aironet 1542iscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:meraki mr33scope:eqversion: -

Trust: 1.0

vendor:aristamodel:c-200scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:aironet 2800scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:catalyst 9105scope:eqversion: -

Trust: 1.0

vendor:intelmodel:proset wireless 7265 \scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:1109-4pscope:eqversion: -

Trust: 1.0

vendor:aristamodel:c-235scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:catalyst iw6300 dcwscope:eqversion: -

Trust: 1.0

vendor:intelmodel:ac 9560scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:webex room 55scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:webex dx80scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:meraki mr42scope:eqversion: -

Trust: 1.0

vendor:intelmodel:proset wi-fi 6e ax210scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:meraki mr55scope:eqversion: -

Trust: 1.0

vendor:aristamodel:c-260scope:eqversion: -

Trust: 1.0

vendor:intelmodel:proset ac 9260scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:catalyst 9130axescope:eqversion: -

Trust: 1.0

vendor:ciscomodel:ir829gw-lte-ga-zk9scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:webex dx70scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:aironet 1832scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:meraki mr36scope:eqversion: -

Trust: 1.0

vendor:aristamodel:c-110scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:aironet 1810scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:meraki mr44scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:catalyst 9120scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:aironet ap803scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:esw6300scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:meraki mr20scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:meraki mr70scope:eqversion: -

Trust: 1.0

vendor:aristamodel:w-68scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:catalyst iw6300scope:eqversion: -

Trust: 1.0

vendor:intelmodel:killer wi-fi 6e ax1675scope:eqversion: -

Trust: 1.0

vendor:intelmodel:proset ac 3168scope:eqversion: -

Trust: 1.0

vendor:intelmodel:proset ac 9461scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:meraki mx68cwscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:webex board 85sscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:aironet 1572scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:webex room 70 dualscope:eqversion: -

Trust: 1.0

vendor:intelmodel:killer ac 1550scope:eqversion: -

Trust: 1.0

vendor:aristamodel:o-90scope:eqversion: -

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:9.0

Trust: 1.0

vendor:ciscomodel:catalyst 9120 apscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:meraki mx65wscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:aironet 1810wscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:catalyst 9105axwscope:eqversion: -

Trust: 1.0

vendor:intelmodel:proset ac 8260scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:meraki mr53scope:eqversion: -

Trust: 1.0

vendor:aristamodel:c-230scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:meraki mr45scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:catalyst iw6300 acscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:meraki mr84scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:meraki mr76scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:meraki mr86scope:eqversion: -

Trust: 1.0

vendor:aristamodel:c-130scope:eqversion: -

Trust: 1.0

vendor:aristamodel:w-118scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:ir829gw-lte-vz-ak9scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:aironet 3800escope:eqversion: -

Trust: 1.0

vendor:ciscomodel:1100-8pscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:webex board 55sscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:ir829-2lte-ea-ak9scope:eqversion: -

Trust: 1.0

vendor:intelmodel:proset ac 9462scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:ip phone 6861scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:aironet 3702scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:catalyst 9130axiscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:catalyst 9120axiscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:ip phone 8861scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:meraki mx67wscope:eqversion: -

Trust: 1.0

vendor:intelmodel:ac 8265scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:catalyst 9124axiscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:webex room kit miniscope:eqversion: -

Trust: 1.0

vendor:intelmodel:proset ac 9560scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:aironet 1702scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:catalyst 9124axdscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:meraki z3cscope:eqversion: -

Trust: 1.0

vendor:intelmodel:ac 9260scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:aironet iw3702scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:meraki mr34scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:aironet 3800scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:catalyst 9120axpscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:meraki gr60scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:meraki mr26scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:1101-4pscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:meraki mr72scope:eqversion: -

Trust: 1.0

vendor:aristamodel:c-65scope:eqversion: -

Trust: 1.0

vendor:intelmodel:wi-fi 6 ax201scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:webex room 70 dual g2scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:catalyst iw6300 dcscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:aironet 4800scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:catalyst 9115axiscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:meraki mr62scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:meraki mx68wscope:eqversion: -

Trust: 1.0

vendor:intelmodel:wi-fi 6 ax200scope:eqversion: -

Trust: 1.0

vendor:aristamodel:c-100scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:ir829-2lte-ea-bk9scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:ir829gw-lte-na-ak9scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:catalyst 9124scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:aironet 2800escope:eqversion: -

Trust: 1.0

vendor:ciscomodel:aironet 1552hscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:catalyst 9117axiscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:aironet 3800pscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:catalyst 9105axiscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:aironet 1842scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:ir829gw-lte-ga-ek9scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:ip phone 8865scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:catalyst 9117 apscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:meraki mr46scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:meraki mr32scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:aironet 1815iscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:webex room 70 single g2scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:aironet 1815scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:meraki mr74scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:ir829gw-lte-ga-ck9scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:ip phone 8832scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:meraki mr46escope:eqversion: -

Trust: 1.0

vendor:ciscomodel:webex room 70 singlescope:eqversion: -

Trust: 1.0

vendor:ciscomodel:catalyst 9117scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:meraki mr53escope:eqversion: -

Trust: 1.0

vendor:ciscomodel:webex room 55 dualscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:catalyst 9130scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:1100scope:eqversion: -

Trust: 1.0

vendor:aristamodel:c-120scope:eqversion: -

Trust: 1.0

vendor:intelmodel:proset ac 3165scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:meraki gr10scope:eqversion: -

Trust: 1.0

vendor:intelmodel:killer wi-fi 6 ax1650scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:webex room 70scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:ir829-2lte-ea-ek9scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:catalyst 9120axescope:eqversion: -

Trust: 1.0

vendor:ciscomodel:webex board 70sscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:ir829gw-lte-ga-sk9scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:ip phone 8821scope:eqversion: -

Trust: 1.0

vendor:intelmodel:proset ac 8265scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:aironet 1800iscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:aironet 3800iscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:meraki mr30hscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:aironet 2702scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:webex board 55scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:aironet 1800scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:meraki mx64wscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:webex room kitscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:catalyst 9115axescope:eqversion: -

Trust: 1.0

vendor:ciscomodel:meraki mr42escope:eqversion: -

Trust: 1.0

vendor:aristamodel:c-250scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:aironet 1532scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:meraki mr52scope:eqversion: -

Trust: 1.0

vendor:intelmodel:proset wi-fi 6 ax201scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:webex board 70scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:1100-4pscope:eqversion: -

Trust: 1.0

vendor:aristamodel:o-105scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:aironet 1542dscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:catalyst 9130 apscope:eqversion: -

Trust: 1.0

vendor:intelmodel:ac 8260scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:catalyst 9115scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:1109-2pscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:meraki mr66scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:aironet 2800iscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:meraki z3scope:eqversion: -

Trust: 1.0

vendor:netbsdmodel:netbsdscope:eqversion:7.1

Trust: 1.0

vendor:ciscomodel:meraki mr56scope:eqversion: -

Trust: 1.0

vendor:ciscomodel:catalyst 9115 apscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:aironet 1552scope:eqversion: -

Trust: 1.0

vendor:日本電気model:nec ai acceleratorscope: - version: -

Trust: 0.8

vendor:日本電気model:atermscope:eqversion: -

Trust: 0.8

vendor:netbsdmodel:netbsdscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2021-006884 // NVD: CVE-2020-26139

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-26139
value: MEDIUM

Trust: 1.0

NVD: CVE-2020-26139
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202105-649
value: MEDIUM

Trust: 0.6

VULMON: CVE-2020-26139
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2020-26139
severity: LOW
baseScore: 2.9
vectorString: AV:A/AC:M/AU:N/C:N/I:N/A:P
accessVector: ADJACENT_NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 5.5
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

nvd@nist.gov: CVE-2020-26139
baseSeverity: MEDIUM
baseScore: 5.3
vectorString: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: ADJACENT
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 1.6
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2020-26139
baseSeverity: MEDIUM
baseScore: 5.3
vectorString: CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: ADJACENT NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULMON: CVE-2020-26139 // JVNDB: JVNDB-2021-006884 // CNNVD: CNNVD-202105-649 // NVD: CVE-2020-26139

PROBLEMTYPE DATA

problemtype:CWE-287

Trust: 1.0

problemtype:Inappropriate authentication (CWE-287) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2021-006884 // NVD: CVE-2020-26139

THREAT TYPE

local

Trust: 0.7

sources: PACKETSTORM: 163249 // PACKETSTORM: 163251 // PACKETSTORM: 163255 // PACKETSTORM: 163291 // PACKETSTORM: 163301 // PACKETSTORM: 163599 // PACKETSTORM: 166417

TYPE

arbitrary

Trust: 0.6

sources: PACKETSTORM: 163249 // PACKETSTORM: 163251 // PACKETSTORM: 163255 // PACKETSTORM: 163291 // PACKETSTORM: 163301 // PACKETSTORM: 163599

PATCH

title:Top Page NEC NEC Product security informationurl:http://www.netbsd.org/

Trust: 0.8

title:NetBSD Remediation measures for authorization problem vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=152353

Trust: 0.6

title:Arch Linux Issues: url:https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues&qid=CVE-2020-26139 log

Trust: 0.1

title:Amazon Linux 2: ALAS2KERNEL-5.4-2022-004url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2KERNEL-5.4-2022-004

Trust: 0.1

title:Ubuntu Security Notice: USN-5343-1: Linux kernel vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-5343-1

Trust: 0.1

title:Cisco: Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021url:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-wifi-faf-22epcEWu

Trust: 0.1

title:Amazon Linux 2: ALAS2KERNEL-5.10-2022-002url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2KERNEL-5.10-2022-002

Trust: 0.1

title: - url:https://github.com/Live-Hack-CVE/CVE-2020-26139

Trust: 0.1

title: - url:https://github.com/kali973/fragAttacks

Trust: 0.1

title:fragattacksurl:https://github.com/vanhoefm/fragattacks

Trust: 0.1

sources: VULMON: CVE-2020-26139 // JVNDB: JVNDB-2021-006884 // CNNVD: CNNVD-202105-649

EXTERNAL IDS

db:NVDid:CVE-2020-26139

Trust: 4.1

db:OPENWALLid:OSS-SECURITY/2021/05/11/12

Trust: 2.5

db:SIEMENSid:SSA-913875

Trust: 1.7

db:JVNid:JVNVU93485736

Trust: 0.8

db:JVNDBid:JVNDB-2021-006884

Trust: 0.8

db:ICS CERTid:ICSA-22-104-04

Trust: 0.7

db:PACKETSTORMid:163249

Trust: 0.7

db:PACKETSTORMid:163291

Trust: 0.7

db:PACKETSTORMid:163599

Trust: 0.7

db:PACKETSTORMid:166417

Trust: 0.7

db:PACKETSTORMid:164875

Trust: 0.6

db:AUSCERTid:ESB-2021.1628

Trust: 0.6

db:AUSCERTid:ESB-2021.4254

Trust: 0.6

db:AUSCERTid:ESB-2021.2453

Trust: 0.6

db:AUSCERTid:ESB-2022.1715

Trust: 0.6

db:AUSCERTid:ESB-2021.2216

Trust: 0.6

db:AUSCERTid:ESB-2021.2876

Trust: 0.6

db:AUSCERTid:ESB-2021.2079

Trust: 0.6

db:AUSCERTid:ESB-2021.3905

Trust: 0.6

db:AUSCERTid:ESB-2022.1225

Trust: 0.6

db:AUSCERTid:ESB-2021.2368

Trust: 0.6

db:AUSCERTid:ESB-2021.2290

Trust: 0.6

db:AUSCERTid:ESB-2021.1899

Trust: 0.6

db:AUSCERTid:ESB-2021.3825

Trust: 0.6

db:AUSCERTid:ESB-2021.2249

Trust: 0.6

db:AUSCERTid:ESB-2021.2136

Trust: 0.6

db:CS-HELPid:SB2021051915

Trust: 0.6

db:CS-HELPid:SB2021051814

Trust: 0.6

db:CS-HELPid:SB2021051212

Trust: 0.6

db:CS-HELPid:SB2021060143

Trust: 0.6

db:CS-HELPid:SB2021100407

Trust: 0.6

db:ICS CERTid:ICSA-21-236-01

Trust: 0.6

db:LENOVOid:LEN-61212

Trust: 0.6

db:CNNVDid:CNNVD-202105-649

Trust: 0.6

db:VULMONid:CVE-2020-26139

Trust: 0.1

db:PACKETSTORMid:163251

Trust: 0.1

db:PACKETSTORMid:163255

Trust: 0.1

db:PACKETSTORMid:163301

Trust: 0.1

db:PACKETSTORMid:165296

Trust: 0.1

sources: VULMON: CVE-2020-26139 // JVNDB: JVNDB-2021-006884 // PACKETSTORM: 163249 // PACKETSTORM: 163251 // PACKETSTORM: 163255 // PACKETSTORM: 163291 // PACKETSTORM: 163301 // PACKETSTORM: 163599 // PACKETSTORM: 165296 // PACKETSTORM: 166417 // CNNVD: CNNVD-202105-649 // NVD: CVE-2020-26139

REFERENCES

url:http://www.openwall.com/lists/oss-security/2021/05/11/12

Trust: 2.5

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-wifi-faf-22epcewu

Trust: 2.3

url:https://nvd.nist.gov/vuln/detail/cve-2020-26139

Trust: 2.1

url:https://www.fragattacks.com

Trust: 1.7

url:https://github.com/vanhoefm/fragattacks/blob/master/summary.md

Trust: 1.7

url:https://lists.debian.org/debian-lts-announce/2021/06/msg00019.html

Trust: 1.7

url:https://lists.debian.org/debian-lts-announce/2021/06/msg00020.html

Trust: 1.7

url:https://cert-portal.siemens.com/productcert/pdf/ssa-913875.pdf

Trust: 1.7

url:https://www.arista.com/en/support/advisories-notices/security-advisories/12602-security-advisory-63

Trust: 1.7

url:https://jvn.jp/vu/jvnvu93485736/

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2020-26147

Trust: 0.7

url:https://access.redhat.com/security/cve/cve-2020-26139

Trust: 0.7

url:https://nvd.nist.gov/vuln/detail/cve-2021-32399

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2020-24586

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2020-24587

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2021-23134

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2021-33034

Trust: 0.6

url:https://www.qualcomm.com/company/product-security/bulletins/august-2021-bulletin

Trust: 0.6

url:https://support.lenovo.com/us/en/product_security/len-61212

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2216

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2876

Trust: 0.6

url:https://source.android.com/security/bulletin/2021-10-01

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.3905

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.1628

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.3825

Trust: 0.6

url:https://us-cert.cisa.gov/ics/advisories/icsa-22-104-04

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2368

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021100407

Trust: 0.6

url:https://us-cert.cisa.gov/ics/advisories/icsa-21-236-01

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021051814

Trust: 0.6

url:https://vigilance.fr/vulnerability/wi-fi-devices-multiple-vulnerabilities-via-fragattacks-35386

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021051915

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021060143

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021051212

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.1225

Trust: 0.6

url:https://packetstormsecurity.com/files/163291/ubuntu-security-notice-usn-5000-2.html

Trust: 0.6

url:https://packetstormsecurity.com/files/164875/red-hat-security-advisory-2021-4140-02.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.1899

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2249

Trust: 0.6

url:https://packetstormsecurity.com/files/166417/ubuntu-security-notice-usn-5343-1.html

Trust: 0.6

url:https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202107-0000001170634565

Trust: 0.6

url:https://packetstormsecurity.com/files/163599/ubuntu-security-notice-usn-5018-1.html

Trust: 0.6

url:https://packetstormsecurity.com/files/163249/ubuntu-security-notice-usn-4997-1.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2136

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.4254

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2079

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2453

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2290

Trust: 0.6

url:https://www.huawei.com/cn/psirt/security-notices/huawei-sn-20210513-01-fragattacks-cn

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.1715

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2020-24588

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2021-33200

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2020-26145

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2021-23133

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2021-3506

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2021-3609

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2021-31829

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2020-26141

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2021-31440

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2021-3543

Trust: 0.3

url:https://ubuntu.com/security/notices/usn-5343-1

Trust: 0.2

url:https://ubuntu.com/security/notices/usn-4997-1

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-25670

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-25673

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-26558

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/287.html

Trust: 0.1

url:https://github.com/live-hack-cve/cve-2020-26139

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://www.cisa.gov/uscert/ics/advisories/icsa-22-104-04

Trust: 0.1

url:https://alas.aws.amazon.com/al2/alaskernel-5.4-2022-004.html

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle/5.11.0-1010.10

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/5.11.0-1011.11

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-raspi/5.11.0-1012.13

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp/5.11.0-1011.12

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure/5.11.0-1009.9

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/5.11.0-22.23

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle-5.8/5.8.0-1033.34~20.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure-5.8/5.8.0-1036.38~20.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-raspi/5.8.0-1029.32

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp/5.8.0-1035.37

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/5.8.0-59.66

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-25671

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-29155

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/5.8.0-1038.40

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure/5.8.0-1036.38

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-hwe-5.8/5.8.0-59.66~20.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-kvm/5.8.0-1030.32

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp-5.8/5.8.0-1035.37~20.04.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws-5.8/5.8.0-1038.40~20.04.1

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-4999-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle/5.8.0-1033.34

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5001-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oem-5.10/5.10.0-1033.34

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5000-2

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5000-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-kvm/5.4.0-1041.42

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-kvm/5.11.0-1009.9

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-4997-2

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux/4.15.0-151.157

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-kvm/4.15.0-1097.99

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-oracle/4.15.0-1078.86

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-gcp-4.15/4.15.0-1106.120

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5018-1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-aws/4.15.0-1109.116

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-raspi2/4.15.0-1092.98

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-azure-4.15/4.15.0-1121.134

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-33909

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/linux-snapdragon/4.15.0-1109.118

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-24504

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-27777

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-20239

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-36158

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-16135

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3200

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-35448

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3635

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-25013

Trust: 0.1

url:https://access.redhat.com/security/vulnerabilities/rhsb-2021-009

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-20284

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-25012

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-35522

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-5827

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-36386

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-35524

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-20673

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-0427

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-25013

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-24586

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3348

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-25009

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-27645

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-33574

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-26140

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3487

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-13435

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-26146

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-31440

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-5827

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3732

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-24370

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-0129

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-43527

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-14145

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-13751

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-10001

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-24502

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-25014

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3564

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-0427

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-23133

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-19603

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-14145

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-25012

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-26144

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-35521

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3679

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-35942

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-17594

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-36312

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-24370

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3572

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-12762

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-36086

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-29368

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3778

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-13750

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-13751

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-22898

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-24588

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-29646

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-29155

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-12762

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-16135

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-36084

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-44228

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-17541

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3489

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3800

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-17594

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-36087

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-36331

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-29660

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3712

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-31535

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-28971

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-23841

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-14615

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-26143

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3445

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3600

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-13435

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-19603

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-22925

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-26145

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-20673

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-23840

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-33200

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-36330

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-29650

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-33033

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-18218

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-20194

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-26147

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-20232

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-31916

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-20266

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-20838

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-22876

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-20231

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-36332

Trust: 0.1

url:https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-14155

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-25010

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-20838

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-17541

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-10001

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-24503

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-25014

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-36085

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-14615

Trust: 0.1

url:https://bugzilla.redhat.com/):

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-33560

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-24502

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-17595

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3481

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:5137

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-42574

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-14155

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-25009

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2018-25010

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-35523

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-31829

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-28153

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3573

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-13750

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-20197

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-26141

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3426

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-28950

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-18218

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3580

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3796

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-17595

Trust: 0.1

url:https://access.redhat.com/security/team/contact/

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-24587

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-24503

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3659

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-34693

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-2853

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-26555

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-12655

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-20292

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-28972

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-36322

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2018-5995

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3564

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-33098

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-33033

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-28688

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-20317

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-29650

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3483

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-36385

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-19449

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2016-2854

Trust: 0.1

sources: VULMON: CVE-2020-26139 // JVNDB: JVNDB-2021-006884 // PACKETSTORM: 163249 // PACKETSTORM: 163251 // PACKETSTORM: 163255 // PACKETSTORM: 163291 // PACKETSTORM: 163301 // PACKETSTORM: 163599 // PACKETSTORM: 165296 // PACKETSTORM: 166417 // CNNVD: CNNVD-202105-649 // NVD: CVE-2020-26139

CREDITS

Ubuntu

Trust: 0.7

sources: PACKETSTORM: 163249 // PACKETSTORM: 163251 // PACKETSTORM: 163255 // PACKETSTORM: 163291 // PACKETSTORM: 163301 // PACKETSTORM: 163599 // PACKETSTORM: 166417

SOURCES

db:VULMONid:CVE-2020-26139
db:JVNDBid:JVNDB-2021-006884
db:PACKETSTORMid:163249
db:PACKETSTORMid:163251
db:PACKETSTORMid:163255
db:PACKETSTORMid:163291
db:PACKETSTORMid:163301
db:PACKETSTORMid:163599
db:PACKETSTORMid:165296
db:PACKETSTORMid:166417
db:CNNVDid:CNNVD-202105-649
db:NVDid:CVE-2020-26139

LAST UPDATE DATE

2024-10-23T19:28:18.272000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2020-26139date:2022-09-30T00:00:00
db:JVNDBid:JVNDB-2021-006884date:2024-02-27T02:31:00
db:CNNVDid:CNNVD-202105-649date:2022-10-08T00:00:00
db:NVDid:CVE-2020-26139date:2022-09-30T03:03:20.207

SOURCES RELEASE DATE

db:VULMONid:CVE-2020-26139date:2021-05-11T00:00:00
db:JVNDBid:JVNDB-2021-006884date:2022-01-24T00:00:00
db:PACKETSTORMid:163249date:2021-06-23T15:33:13
db:PACKETSTORMid:163251date:2021-06-23T15:35:21
db:PACKETSTORMid:163255date:2021-06-23T15:41:26
db:PACKETSTORMid:163291date:2021-06-27T12:22:22
db:PACKETSTORMid:163301date:2021-06-28T16:22:26
db:PACKETSTORMid:163599date:2021-07-21T16:04:42
db:PACKETSTORMid:165296date:2021-12-15T15:27:05
db:PACKETSTORMid:166417date:2022-03-23T16:02:30
db:CNNVDid:CNNVD-202105-649date:2021-05-11T00:00:00
db:NVDid:CVE-2020-26139date:2021-05-11T20:15:08.647