CVE-2021-33200 |
Medium |
No |
Privilege escalation |
kernel/bpf/verifier.c in the Linux kernel before 5.12.8 enforces incorrect limits for pointer arithmetic operations, aka CID- bb01a1bba579. This can be... |
CVE-2021-32606 |
Medium |
No |
Privilege escalation |
In the Linux kernel since 5.11 before 5.12.9, isotp_setsockopt in net/can/isotp.c allows privilege escalation to root by leveraging a use-after-free. (This... |
CVE-2020-26147 |
Medium |
Yes |
Insufficient validation |
An issue was discovered in the Linux kernel before version 5.12.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of... |
CVE-2020-26145 |
Medium |
Yes |
Insufficient validation |
An issue was discovered in the Linux kernel before version 5.12.9. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast... |
CVE-2020-26141 |
Medium |
Yes |
Insufficient validation |
An issue was discovered in the Linux kernel before version 5.12.9. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of... |
CVE-2020-26139 |
Medium |
Yes |
Insufficient validation |
An issue was discovered in the Linux kernel before version 5.12.9. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has... |
CVE-2020-24588 |
Medium |
Yes |
Insufficient validation |
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in... |
CVE-2020-24587 |
Medium |
Yes |
Information disclosure |
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a... |
CVE-2020-24586 |
Medium |
Yes |
Information disclosure |
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that received fragments... |