A flaw was found in the Linux kernel loose validation of child/parent process identification handling while filtering signal handlers. A local attacker is able to abuse this flaw to bypass checks to send any signal to a privileged process.
Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
bugzilla.redhat.com/show_bug.cgi?id=1822077
git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d1e7fd6462ca9fc76650fbe6ca800e35b24267da
lists.openwall.net/linux-kernel/2020/03/24/1803
nvd.nist.gov/vuln/detail/CVE-2020-12826
www.cve.org/CVERecord?id=CVE-2020-12826
www.openwall.com/lists/kernel-hardening/2020/03/25/1