Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[java] Add CVE-2020-10711 #13911

Open
wants to merge 1 commit into
base: master
Choose a base branch
from
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
26 changes: 26 additions & 0 deletions database/java/2020/10711.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,26 @@
---
cve: 2020-10711
title: CVE in br.com.thiagomoreira.liferay.plugins.fix-virtual-host-app:fix-virtual-host-hook
description: >
A NULL pointer dereference flaw was found in the Linux kernel's SELinux subsystem in versions before 5.7. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol's category bitmap into the SELinux extensible bitmap via the' ebitmap_netlbl_import' routine. While processing the CIPSO restricted bitmap tag in the 'cipso_v4_parsetag_rbm' routine, it sets the security attribute to indicate that the category bitmap is present, even if it has not been allocated. This issue leads to a NULL pointer dereference issue while importing the same category bitmap into SELinux. This flaw allows a remote network user to crash the system kernel, resulting in a denial of service.
cvss_v2: 4.3
references:
- http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10711
- https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
- https://security.netapp.com/advisory/ntap-20200608-0001/
- https://usn.ubuntu.com/4413-1/
- https://www.debian.org/security/2020/dsa-4698
- https://www.debian.org/security/2020/dsa-4699
- https://www.openwall.com/lists/oss-security/2020/05/12/2
affected:
- groupId: br.com.thiagomoreira.liferay.plugins.fix-virtual-host-app
artifactId: fix-virtual-host-hook
version:
- "<=2.0.0,2.0.0"
- "<=4.0.0,4.0.0"
fixedin:
- ">=4.1.0"
- "<=3.0.0,3.0.0"
- "<=1.1.0,1.0.0"