CVE-2020-10751
kernel: SELinux netlink permission check bypass
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A flaw was found in the Linux kernels SELinux LSM hook implementation before version 5.7, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing.
Se detectó un fallo en la implementación del enlace SELinux LSM de kernels de Linux versiones anteriores a 5.7, donde se asumía incorrectamente que un skb solo contendría un único mensaje netlink. El enlace incorrectamente solo comprobaría el primer mensaje netlink en el skb y permitiría o denegaría el resto de los mensajes dentro del skb con el permiso otorgado sin procesamiento adicional.
A flaw was found in the Linux kernel’s SELinux LSM hook implementation, where it anticipated the skb would only contain a single Netlink message. The hook incorrectly validated the first Netlink message in the skb only, to allow or deny the rest of the messages within the skb with the granted permissions and without further processing. At this time, there is no known ability for an attacker to abuse this flaw.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2020-03-20 CVE Reserved
- 2020-05-26 CVE Published
- 2023-03-08 EPSS Updated
- 2024-08-04 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-345: Insufficient Verification of Data Authenticity
- CWE-349: Acceptance of Extraneous Untrusted Data With Trusted Data
CAPEC
References (20)
URL | Tag | Source |
---|---|---|
http://www.openwall.com/lists/oss-security/2020/05/27/3 | Mailing List | |
https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html | Mailing List | |
https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html | Mailing List | |
https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html | Mailing List | |
https://lore.kernel.org/selinux/CACT4Y+b8HiV6KFuAPysZD=5hmyO4QisgxCKi4DHU3CfMPSP=yg%40mail.gmail.com | X_refsource_confirm | |
https://www.openwall.com/lists/oss-security/2020/04/30/5 | Mailing List | |
https://www.oracle.com/security-alerts/cpuApr2021.html | X_refsource_misc |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html | 2023-02-12 | |
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html | 2023-02-12 | |
https://usn.ubuntu.com/4389-1 | 2023-02-12 | |
https://usn.ubuntu.com/4390-1 | 2023-02-12 | |
https://usn.ubuntu.com/4391-1 | 2023-02-12 | |
https://usn.ubuntu.com/4412-1 | 2023-02-12 | |
https://usn.ubuntu.com/4413-1 | 2023-02-12 | |
https://www.debian.org/security/2020/dsa-4698 | 2023-02-12 | |
https://www.debian.org/security/2020/dsa-4699 | 2023-02-12 | |
https://access.redhat.com/security/cve/CVE-2020-10751 | 2020-11-04 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1839634 | 2020-11-04 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Kernel Search vendor "Kernel" | Selinux Search vendor "Kernel" for product "Selinux" | < 5.7 Search vendor "Kernel" for product "Selinux" and version " < 5.7" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Server Search vendor "Redhat" for product "Enterprise Linux Server" | 7.0 Search vendor "Redhat" for product "Enterprise Linux Server" and version "7.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Server Search vendor "Redhat" for product "Enterprise Linux Server" | 8.0 Search vendor "Redhat" for product "Enterprise Linux Server" and version "8.0" | - |
Affected
|