Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-10751

Опубликовано: 26 мая 2020
Источник: debian
EPSS Низкий

Описание

A flaw was found in the Linux kernels SELinux LSM hook implementation before version 5.7, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed5.6.14-1package

Примечания

  • https://git.kernel.org/linus/fb73974172ffaaf57a7c42f35424d9aece1a5af6

EPSS

Процентиль: 27%
0.00093
Низкий

Связанные уязвимости

CVSS3: 6.1
ubuntu
около 5 лет назад

A flaw was found in the Linux kernels SELinux LSM hook implementation before version 5.7, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing.

CVSS3: 6.1
redhat
около 5 лет назад

A flaw was found in the Linux kernels SELinux LSM hook implementation before version 5.7, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing.

CVSS3: 6.1
nvd
около 5 лет назад

A flaw was found in the Linux kernels SELinux LSM hook implementation before version 5.7, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing.

CVSS3: 6.1
github
около 3 лет назад

A flaw was found in the Linux kernels SELinux LSM hook implementation before version 5.7, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing.

CVSS3: 6.1
fstec
около 5 лет назад

Уязвимость системы принудительного контроля доступа SELinux с модулями безопасности Linux Security Modules (LSM) ядра операционных систем Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

EPSS

Процентиль: 27%
0.00093
Низкий