5.3 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
4.4 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:M/Au:N/C:P/I:P/A:P
0.001 Low
EPSS
Percentile
19.1%
A signal access-control issue was discovered in the Linux kernel before
5.6.5, aka CID-7395ea4e65c2. Because exec_id in include/linux/sched.h is
only 32 bits, an integer overflow can interfere with a do_notify_parent
protection mechanism. A child process can send an arbitrary signal to a
parent process in a different security domain. Exploitation limitations
include the amount of elapsed time before an integer overflow occurs, and
the lack of scenarios where signals to a parent process present a
substantial operational threat.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux | <Β 4.15.0-101.102 | UNKNOWN |
ubuntu | 19.10 | noarch | linux | <Β 5.3.0-53.47 | UNKNOWN |
ubuntu | 20.04 | noarch | linux | <Β 5.4.0-31.35 | UNKNOWN |
ubuntu | 16.04 | noarch | linux | <Β 4.4.0-184.214 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | <Β 4.15.0-1067.71 | UNKNOWN |
ubuntu | 19.10 | noarch | linux-aws | <Β 5.3.0-1019.21 | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | <Β 5.4.0-1011.11 | UNKNOWN |
ubuntu | 14.04 | noarch | linux-aws | <Β 4.4.0-1073.77) Available with Ubuntu Pro or Ubuntu Pro (Infra-only | UNKNOWN |
ubuntu | 16.04 | noarch | linux-aws | <Β 4.4.0-1109.120 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws-5.3 | <Β 5.3.0-1019.21~18.04.1 | UNKNOWN |
bugzilla.redhat.com/show_bug.cgi?id=1822077
cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.5
git.kernel.org/linus/d1e7fd6462ca9fc76650fbe6ca800e35b24267da
github.com/torvalds/linux/commit/7395ea4e65c2a00d23185a3f63ad315756ba9cef
launchpad.net/bugs/cve/CVE-2020-12826
lists.openwall.net/linux-kernel/2020/03/24/1803
nvd.nist.gov/vuln/detail/CVE-2020-12826
security-tracker.debian.org/tracker/CVE-2020-12826
ubuntu.com/security/notices/USN-4367-1
ubuntu.com/security/notices/USN-4369-1
ubuntu.com/security/notices/USN-4391-1
www.cve.org/CVERecord?id=CVE-2020-12826
www.openwall.com/lists/kernel-hardening/2020/03/25/1
5.3 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
4.4 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:L/AC:M/Au:N/C:P/I:P/A:P
0.001 Low
EPSS
Percentile
19.1%