A flaw was found in the Linux kernel's SELinux LSM hook implementation, where it anticipated the skb would only contain a single Netlink message. The hook incorrectly validated the first Netlink message in the skb only, to allow or deny the rest of the messages within the skb with the granted permissions and without further processing. At this time, there is no known ability for an attacker to abuse this flaw.
Platform | Package | Release Date | Advisory |
---|---|---|---|
Amazon Linux 1 | kernel | 2020-06-01 12:24 | ALAS-2020-1377 |
Amazon Linux 2 - Core | kernel | 2020-06-01 22:37 | ALAS2-2020-1431 |
Amazon Linux 2 - Kernel-5.4 Extra | kernel | 2022-01-20 19:20 | ALAS2KERNEL-5.4-2022-012 |
Score Type | Score | Vector | |
---|---|---|---|
Amazon Linux | CVSSv3 | 6.1 | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N |
NVD | CVSSv2 | 3.6 | AV:L/AC:L/Au:N/C:P/I:P/A:N |
NVD | CVSSv3 | 6.1 | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N |