CVE-2020-13401

An issue was discovered in Docker Engine before 19.03.11. An attacker in a container, with the CAP_NET_RAW capability, can craft IPv6 router advertisements, and consequently spoof external IPv6 hosts, obtain sensitive information, or cause a denial of service.
Configurations

Configuration 1 (hide)

cpe:2.3:a:docker:engine:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:a:broadcom:sannav:-:*:*:*:*:*:*:*

History

07 Nov 2023, 03:16

Type Values Removed Values Added
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJZLKRCOJMOGUIJI2AS27BOZS3RBEF3K/', 'name': 'FEDORA-2020-6d7deafd81', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DN4JQAOXBE3XUNK3FD423LHE3K74EMJT/', 'name': 'FEDORA-2020-5ba8c2d9d5', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DN4JQAOXBE3XUNK3FD423LHE3K74EMJT/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KJZLKRCOJMOGUIJI2AS27BOZS3RBEF3K/ -

01 Mar 2023, 16:48

Type Values Removed Values Added
CPE cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:a:broadcom:sannav:-:*:*:*:*:*:*:*
First Time Fedoraproject
Debian
Broadcom
Broadcom sannav
Fedoraproject fedora
Debian debian Linux
References (DEBIAN) https://www.debian.org/security/2020/dsa-4716 - (DEBIAN) https://www.debian.org/security/2020/dsa-4716 - Third Party Advisory
References (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DN4JQAOXBE3XUNK3FD423LHE3K74EMJT/ - (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DN4JQAOXBE3XUNK3FD423LHE3K74EMJT/ - Mailing List, Third Party Advisory
References (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJZLKRCOJMOGUIJI2AS27BOZS3RBEF3K/ - (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJZLKRCOJMOGUIJI2AS27BOZS3RBEF3K/ - Mailing List, Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00040.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00040.html - Broken Link
References (GENTOO) https://security.gentoo.org/glsa/202008-15 - (GENTOO) https://security.gentoo.org/glsa/202008-15 - Third Party Advisory
References (CONFIRM) https://security.netapp.com/advisory/ntap-20200717-0002/ - (CONFIRM) https://security.netapp.com/advisory/ntap-20200717-0002/ - Third Party Advisory

Information

Published : 2020-06-02 14:15

Updated : 2023-12-10 13:27


NVD link : CVE-2020-13401

Mitre link : CVE-2020-13401

CVE.ORG link : CVE-2020-13401


JSON object : View

Products Affected

debian

  • debian_linux

broadcom

  • sannav

fedoraproject

  • fedora

docker

  • engine
CWE
CWE-20

Improper Input Validation