[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248149

 
 

909

 
 

194803

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2020-12826Date: (C)2020-05-14   (M)2024-04-19


A signal access-control issue was discovered in the Linux kernel before 5.6.5, aka CID-7395ea4e65c2. Because exec_id in include/linux/sched.h is only 32 bits, an integer overflow can interfere with a do_notify_parent protection mechanism. A child process can send an arbitrary signal to a parent process in a different security domain. Exploitation limitations include the amount of elapsed time before an integer overflow occurs, and the lack of scenarios where signals to a parent process present a substantial operational threat.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 5.3CVSS Score : 4.4
Exploit Score: 1.8Exploit Score: 3.4
Impact Score: 3.4Impact Score: 6.4
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: LOCALAccess Vector: LOCAL
Attack Complexity: LOWAccess Complexity: MEDIUM
Privileges Required: LOWAuthentication: NONE
User Interaction: NONEConfidentiality: PARTIAL
Scope: UNCHANGEDIntegrity: PARTIAL
Confidentiality: LOWAvailability: PARTIAL
Integrity: LOW 
Availability: LOW 
  
Reference:
USN-4367-1
USN-4369-1
USN-4391-1
https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
https://bugzilla.redhat.com/show_bug.cgi?id=1822077
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.5
https://github.com/torvalds/linux/commit/7395ea4e65c2a00d23185a3f63ad315756ba9cef
https://lists.openwall.net/linux-kernel/2020/03/24/1803
https://security.netapp.com/advisory/ntap-20200608-0001/
https://www.openwall.com/lists/kernel-hardening/2020/03/25/1

CPE    3
cpe:/o:redhat:enterprise_linux:5.0
cpe:/o:redhat:enterprise_linux:7.0
cpe:/o:linux:linux_kernel
CWE    1
CWE-190
OVAL    17
oval:org.secpod.oval:def:70211
oval:org.secpod.oval:def:1601161
oval:org.secpod.oval:def:705481
oval:org.secpod.oval:def:1601129
...

© SecPod Technologies