CVE-2020-10751

NameCVE-2020-10751
DescriptionA flaw was found in the Linux kernels SELinux LSM hook implementation before version 5.7, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-2241-1, DLA-2242-1, DSA-4698-1, DSA-4699-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
linux (PTS)bullseye5.10.223-1fixed
bullseye (security)5.10.226-1fixed
bookworm6.1.106-3fixed
bookworm (security)6.1.112-1fixed
trixie6.10.11-1fixed
sid6.11.2-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
linuxsourcejessie3.16.84-1DLA-2241-1
linuxsourcestretch4.9.210-1+deb9u1DSA-4698-1
linuxsourcebuster4.19.118-2+deb10u1DSA-4699-1
linuxsource(unstable)5.6.14-1
linux-4.9sourcejessie4.9.210-1+deb9u1~deb8u1DLA-2242-1

Notes

https://git.kernel.org/linus/fb73974172ffaaf57a7c42f35424d9aece1a5af6

Search for package or bug name: Reporting problems