CVE-2020-10751
kernel: SELinux netlink permission check bypass
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A flaw was found in the Linux kernels SELinux LSM hook implementation before version 5.7, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing.
Se detectó un fallo en la implementación del enlace SELinux LSM de kernels de Linux versiones anteriores a 5.7, donde se asumía incorrectamente que un skb solo contendría un único mensaje netlink. El enlace incorrectamente solo comprobaría el primer mensaje netlink en el skb y permitiría o denegaría el resto de los mensajes dentro del skb con el permiso otorgado sin procesamiento adicional.
A flaw was found in the Linux kernel’s SELinux LSM hook implementation, where it anticipated the skb would only contain a single Netlink message. The hook incorrectly validated the first Netlink message in the skb only, to allow or deny the rest of the messages within the skb with the granted permissions and without further processing. At this time, there is no known ability for an attacker to abuse this flaw.
It was discovered that the ext4 file system implementation in the Linux kernel did not properly handle setxattr operations in some situations. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. It was discovered that memory contents previously stored in microarchitectural special registers after RDRAND, RDSEED, and SGX EGETKEY read operations on Intel client and Xeon E3 processors may be briefly exposed to processes on the same or different processor cores. A local attacker could use this to expose sensitive information. Various other issues were also addressed.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2020-03-20 CVE Reserved
- 2020-05-26 CVE Published
- 2024-08-04 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-345: Insufficient Verification of Data Authenticity
- CWE-349: Acceptance of Extraneous Untrusted Data With Trusted Data
CAPEC
References (20)
URL | Tag | Source |
---|---|---|
http://www.openwall.com/lists/oss-security/2020/05/27/3 | Mailing List |
|
https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html | Mailing List |
|
https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html | Mailing List |
|
https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html | Mailing List |
|
https://lore.kernel.org/selinux/CACT4Y+b8HiV6KFuAPysZD=5hmyO4QisgxCKi4DHU3CfMPSP=yg%40mail.gmail.com | X_refsource_confirm | |
https://www.openwall.com/lists/oss-security/2020/04/30/5 | Mailing List |
|
https://www.oracle.com/security-alerts/cpuApr2021.html | X_refsource_misc |
|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html | 2023-02-12 | |
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html | 2023-02-12 | |
https://usn.ubuntu.com/4389-1 | 2023-02-12 | |
https://usn.ubuntu.com/4390-1 | 2023-02-12 | |
https://usn.ubuntu.com/4391-1 | 2023-02-12 | |
https://usn.ubuntu.com/4412-1 | 2023-02-12 | |
https://usn.ubuntu.com/4413-1 | 2023-02-12 | |
https://www.debian.org/security/2020/dsa-4698 | 2023-02-12 | |
https://www.debian.org/security/2020/dsa-4699 | 2023-02-12 | |
https://access.redhat.com/security/cve/CVE-2020-10751 | 2020-11-04 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1839634 | 2020-11-04 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Kernel Search vendor "Kernel" | Selinux Search vendor "Kernel" for product "Selinux" | < 5.7 Search vendor "Kernel" for product "Selinux" and version " < 5.7" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Server Search vendor "Redhat" for product "Enterprise Linux Server" | 7.0 Search vendor "Redhat" for product "Enterprise Linux Server" and version "7.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Server Search vendor "Redhat" for product "Enterprise Linux Server" | 8.0 Search vendor "Redhat" for product "Enterprise Linux Server" and version "8.0" | - |
Affected
|