A NULL pointer dereference flaw was found in the Linux kernel's SELinux subsystem in versions before 5.7. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol's category bitmap into the SELinux extensible bitmap via the' ebitmap_netlbl_import' routine. While processing the CIPSO restricted bitmap tag in the 'cipso_v4_parsetag_rbm' routine, it sets the security attribute to indicate that the category bitmap is present, even if it has not been allocated. This issue leads to a NULL pointer dereference issue while importing the same category bitmap into SELinux. This flaw allows a remote network user to crash the system kernel, resulting in a denial of service.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
21 Nov 2024, 04:55
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html - Mailing List, Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10711 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html - Third Party Advisory | |
References | () https://security.netapp.com/advisory/ntap-20200608-0001/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/4411-1/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/4412-1/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/4413-1/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/4414-1/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/4419-1/ - Third Party Advisory | |
References | () https://www.debian.org/security/2020/dsa-4698 - Third Party Advisory | |
References | () https://www.debian.org/security/2020/dsa-4699 - Third Party Advisory | |
References | () https://www.openwall.com/lists/oss-security/2020/05/12/2 - Mailing List, Patch, Third Party Advisory |
Information
Published : 2020-05-22 15:15
Updated : 2024-11-21 04:55
NVD link : CVE-2020-10711
Mitre link : CVE-2020-10711
CVE.ORG link : CVE-2020-10711
JSON object : View
Products Affected
redhat
- openstack
- enterprise_linux
- 3scale
- enterprise_linux_aus
- messaging_realtime_grid
- enterprise_linux_server_tus
- virtualization_host
canonical
- ubuntu_linux
opensuse
- leap
linux
- linux_kernel
debian
- debian_linux
CWE
CWE-476
NULL Pointer Dereference