CVE-2020-10711

A NULL pointer dereference flaw was found in the Linux kernel's SELinux subsystem in versions before 5.7. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol's category bitmap into the SELinux extensible bitmap via the' ebitmap_netlbl_import' routine. While processing the CIPSO restricted bitmap tag in the 'cipso_v4_parsetag_rbm' routine, it sets the security attribute to indicate that the category bitmap is present, even if it has not been allocated. This issue leads to a NULL pointer dereference issue while importing the same category bitmap into SELinux. This flaw allows a remote network user to crash the system kernel, resulting in a denial of service.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html Mailing List Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10711 Issue Tracking Patch Third Party Advisory
https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html Third Party Advisory
https://security.netapp.com/advisory/ntap-20200608-0001/ Third Party Advisory
https://usn.ubuntu.com/4411-1/ Third Party Advisory
https://usn.ubuntu.com/4412-1/ Third Party Advisory
https://usn.ubuntu.com/4413-1/ Third Party Advisory
https://usn.ubuntu.com/4414-1/ Third Party Advisory
https://usn.ubuntu.com/4419-1/ Third Party Advisory
https://www.debian.org/security/2020/dsa-4698 Third Party Advisory
https://www.debian.org/security/2020/dsa-4699 Third Party Advisory
https://www.openwall.com/lists/oss-security/2020/05/12/2 Mailing List Patch Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html Mailing List Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10711 Issue Tracking Patch Third Party Advisory
https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html Third Party Advisory
https://security.netapp.com/advisory/ntap-20200608-0001/ Third Party Advisory
https://usn.ubuntu.com/4411-1/ Third Party Advisory
https://usn.ubuntu.com/4412-1/ Third Party Advisory
https://usn.ubuntu.com/4413-1/ Third Party Advisory
https://usn.ubuntu.com/4414-1/ Third Party Advisory
https://usn.ubuntu.com/4419-1/ Third Party Advisory
https://www.debian.org/security/2020/dsa-4698 Third Party Advisory
https://www.debian.org/security/2020/dsa-4699 Third Party Advisory
https://www.openwall.com/lists/oss-security/2020/05/12/2 Mailing List Patch Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:redhat:3scale:2.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openstack:13:*:*:*:*:*:*:*
cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_aus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:messaging_realtime_grid:2.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*

History

21 Nov 2024, 04:55

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html - Mailing List, Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html - Mailing List, Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10711 - Issue Tracking, Patch, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10711 - Issue Tracking, Patch, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html - Third Party Advisory () https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html - Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20200608-0001/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20200608-0001/ - Third Party Advisory
References () https://usn.ubuntu.com/4411-1/ - Third Party Advisory () https://usn.ubuntu.com/4411-1/ - Third Party Advisory
References () https://usn.ubuntu.com/4412-1/ - Third Party Advisory () https://usn.ubuntu.com/4412-1/ - Third Party Advisory
References () https://usn.ubuntu.com/4413-1/ - Third Party Advisory () https://usn.ubuntu.com/4413-1/ - Third Party Advisory
References () https://usn.ubuntu.com/4414-1/ - Third Party Advisory () https://usn.ubuntu.com/4414-1/ - Third Party Advisory
References () https://usn.ubuntu.com/4419-1/ - Third Party Advisory () https://usn.ubuntu.com/4419-1/ - Third Party Advisory
References () https://www.debian.org/security/2020/dsa-4698 - Third Party Advisory () https://www.debian.org/security/2020/dsa-4698 - Third Party Advisory
References () https://www.debian.org/security/2020/dsa-4699 - Third Party Advisory () https://www.debian.org/security/2020/dsa-4699 - Third Party Advisory
References () https://www.openwall.com/lists/oss-security/2020/05/12/2 - Mailing List, Patch, Third Party Advisory () https://www.openwall.com/lists/oss-security/2020/05/12/2 - Mailing List, Patch, Third Party Advisory

Information

Published : 2020-05-22 15:15

Updated : 2024-11-21 04:55


NVD link : CVE-2020-10711

Mitre link : CVE-2020-10711

CVE.ORG link : CVE-2020-10711


JSON object : View

Products Affected

redhat

  • openstack
  • enterprise_linux
  • 3scale
  • enterprise_linux_aus
  • messaging_realtime_grid
  • enterprise_linux_server_tus
  • virtualization_host

canonical

  • ubuntu_linux

opensuse

  • leap

linux

  • linux_kernel

debian

  • debian_linux
CWE
CWE-476

NULL Pointer Dereference