SELinux LSM is vulnerable to incorrect permission check. Incorrect validations in netlink messages allows permission check bypass.
lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html
lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html
www.openwall.com/lists/oss-security/2020/05/27/3
access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.3_release_notes/index
access.redhat.com/errata/RHSA-2020:4060
access.redhat.com/errata/RHSA-2020:4062
access.redhat.com/errata/RHSA-2020:4431
access.redhat.com/errata/RHSA-2020:4609
access.redhat.com/security/cve/CVE-2020-10751
access.redhat.com/security/updates/classification/#moderate
bugzilla.redhat.com/show_bug.cgi?id=1839634
bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10751
git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fb73974172ffaaf57a7c42f35424d9aece1a5af6
lists.debian.org/debian-lts-announce/2020/06/msg00011.html
lists.debian.org/debian-lts-announce/2020/06/msg00012.html
lists.debian.org/debian-lts-announce/2020/06/msg00013.html
lore.kernel.org/selinux/CACT4Y+b8HiV6KFuAPysZD=5hmyO4QisgxCKi4DHU3CfMPSP=yg%40mail.gmail.com/
lore.kernel.org/selinux/CACT4Y+b8HiV6KFuAPysZD=5hmyO4QisgxCKi4DHU3CfMPSP=yg@mail.gmail.com/
usn.ubuntu.com/4389-1/
usn.ubuntu.com/4390-1/
usn.ubuntu.com/4391-1/
usn.ubuntu.com/4412-1/
usn.ubuntu.com/4413-1/
www.debian.org/security/2020/dsa-4698
www.debian.org/security/2020/dsa-4699
www.openwall.com/lists/oss-security/2020/04/30/5
www.oracle.com/security-alerts/cpuApr2021.html