A signal access-control issue was discovered in the Linux kernel before 5.6.5, aka CID-7395ea4e65c2. Because exec_id in include/linux/sched.h is only 32 bits, an integer overflow can interfere with a do_notify_parent protection mechanism. A child process can send an arbitrary signal to a parent process in a different security domain. Exploitation limitations include the amount of elapsed time before an integer overflow occurs, and the lack of scenarios where signals to a parent process present a substantial operational threat.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
No history.
Information
Published : 2020-05-12 19:15
Updated : 2024-11-21 05:00
NVD link : CVE-2020-12826
Mitre link : CVE-2020-12826
CVE.ORG link : CVE-2020-12826
JSON object : View
Products Affected
redhat
- enterprise_mrg
- enterprise_linux
linux
- linux_kernel
canonical
- ubuntu_linux
CWE
CWE-190
Integer Overflow or Wraparound