Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2020-10751


A flaw was found in the Linux kernels SELinux LSM hook implementation before version 5.7, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing.


Published

2020-05-26T15:15:10.727

Last Modified

2024-11-21T04:55:59.600

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 6.1 (MEDIUM)

CVSSv2 Vector

AV:L/AC:L/Au:N/C:P/I:P/A:N

  • Access Vector: LOCAL
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: NONE
Exploitability Score

3.9

Impact Score

4.9

Weaknesses
  • Type: Primary
    CWE-349
  • Type: Secondary
    CWE-345

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application kernel selinux < 5.7 Yes
Operating System redhat enterprise_linux_server 7.0 Yes
Operating System redhat enterprise_linux_server 8.0 Yes

References