Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

CVE ID:CVE-2020-10751
Description:A flaw was found in the Linux kernels SELinux LSM hook implementation before version 5.7, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing.
Test IDs: 1.3.6.1.4.1.25623.1.0.704699  
Cross References: Common Vulnerability Exposure (CVE) ID: CVE-2020-10751
DSA-4698
https://www.debian.org/security/2020/dsa-4698
DSA-4699
https://www.debian.org/security/2020/dsa-4699
USN-4389-1
https://usn.ubuntu.com/4389-1/
USN-4390-1
https://usn.ubuntu.com/4390-1/
USN-4391-1
https://usn.ubuntu.com/4391-1/
USN-4412-1
https://usn.ubuntu.com/4412-1/
USN-4413-1
https://usn.ubuntu.com/4413-1/
[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update
https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update
https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update
https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
[oss-security] 20200527 CVE-2020-10751 - Linux kernel: SELinux netlink permission check bypass
http://www.openwall.com/lists/oss-security/2020/05/27/3
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10751
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10751
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fb73974172ffaaf57a7c42f35424d9aece1a5af6
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fb73974172ffaaf57a7c42f35424d9aece1a5af6
https://lore.kernel.org/selinux/CACT4Y+b8HiV6KFuAPysZD=5hmyO4QisgxCKi4DHU3CfMPSP=yg%40mail.gmail.com/
https://lore.kernel.org/selinux/CACT4Y+b8HiV6KFuAPysZD=5hmyO4QisgxCKi4DHU3CfMPSP=yg%40mail.gmail.com/
https://www.openwall.com/lists/oss-security/2020/04/30/5
https://www.openwall.com/lists/oss-security/2020/04/30/5
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpuApr2021.html
openSUSE-SU-2020:0801
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html
openSUSE-SU-2020:0935
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html




© 1998-2025 E-Soft Inc. All rights reserved.