CVE-2020-12826
Summary
| CVE | CVE-2020-12826 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-05-12 19:15:00 UTC |
| Updated | 2021-07-15 19:16:00 UTC |
| Description | A signal access-control issue was discovered in the Linux kernel before 5.6.5, aka CID-7395ea4e65c2. Because exec_id in include/linux/sched.h is only 32 bits, an integer overflow can interfere with a do_notify_parent protection mechanism. A child process can send an arbitrary signal to a parent process in a different security domain. Exploitation limitations include the amount of elapsed time before an integer overflow occurs, and the lack of scenarios where signals to a parent process present a substantial operational threat. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| kernel-hardening - Curiosity around 'exec_id' and some problems associated with it |
MISC |
www.openwall.com |
Exploit, Mailing List, Patch, Third Party Advisory |
| May 2020 Linux Kernel Vulnerabilities in NetApp Products | NetApp Product Security |
CONFIRM |
security.netapp.com |
|
| USN-4391-1: Linux kernel vulnerabilities | Ubuntu security notices |
UBUNTU |
usn.ubuntu.com |
|
| signal: Extend exec_id to 64bits · torvalds/linux@7395ea4 · GitHub |
MISC |
github.com |
Patch, Third Party Advisory |
| [SECURITY] [DLA 2241-2] linux security update |
MLIST |
lists.debian.org |
|
| USN-4369-1: Linux kernel vulnerabilities | Ubuntu security notices | Ubuntu |
UBUNTU |
usn.ubuntu.com |
|
| cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.6.5 |
MISC |
cdn.kernel.org |
Release Notes, Third Party Advisory |
| 1822077 – (CVE-2020-12826) CVE-2020-12826 kernel: possible to send arbitrary signals to a privileged (suidroot) parent process |
CONFIRM |
bugzilla.redhat.com |
Issue Tracking, Patch, Third Party Advisory |
| linux-kernel - Curiosity around 'exec_id' and some problems associated with it |
MISC |
lists.openwall.net |
Exploit, Mailing List, Patch, Third Party Advisory |
| USN-4367-1: Linux kernel vulnerabilities | Ubuntu security notices |
UBUNTU |
usn.ubuntu.com |
Third Party Advisory |
| [SECURITY] [DLA 2241-1] linux security update |
MLIST |
lists.debian.org |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 159684 Oracle Enterprise Linux Security Update for kernel (ELSA-2020-4431)
- 352300 Amazon Linux Security Advisory for kernel: ALAC2012-2020-020
- 610324 Google Android March 2021 Security Patch Missing for Huawei EMUI
- 900076 CBL-Mariner Linux Security Update for kernel 5.4.91
- 903235 Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (3477)
- 906179 Common Base Linux Mariner (CBL-Mariner) Security Update for kernel (3477-1)
- 940256 AlmaLinux Security Update for kernel (ALSA-2020:4431)