Description
A signal access-control issue was discovered in the Linux kernel before 5.6.5, aka CID-7395ea4e65c2. Because exec_id in include/linux/sched.h is only 32 bits, an integer overflow can interfere with a do_notify_parent protection mechanism. A child process can send an arbitrary signal to a parent process in a different security domain. Exploitation limitations include the amount of elapsed time before an integer overflow occurs, and the lack of scenarios where signals to a parent process present a substantial operational threat.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2241-1 | linux security update |
Debian DLA |
DLA-2241-2 | linux security update |
EUVD |
EUVD-2020-5109 | A signal access-control issue was discovered in the Linux kernel before 5.6.5, aka CID-7395ea4e65c2. Because exec_id in include/linux/sched.h is only 32 bits, an integer overflow can interfere with a do_notify_parent protection mechanism. A child process can send an arbitrary signal to a parent process in a different security domain. Exploitation limitations include the amount of elapsed time before an integer overflow occurs, and the lack of scenarios where signals to a parent process present a substantial operational threat. |
Ubuntu USN |
USN-4367-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-4369-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-4391-1 | Linux kernel vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T12:04:22.878Z
Reserved: 2020-05-12T00:00:00.000Z
Link: CVE-2020-12826
No data.
Status : Modified
Published: 2020-05-12T19:15:11.080
Modified: 2024-11-21T05:00:20.960
Link: CVE-2020-12826
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN