Lucene search

K
ubuntucveUbuntu.comUB:CVE-2020-35508
HistoryDec 31, 2020 - 12:00 a.m.

CVE-2020-35508

2020-12-3100:00:00
ubuntu.com
ubuntu.com
18
linux kernel
signal handling
privilege escalation

CVSS2

4.4

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:M/Au:N/C:P/I:P/A:P

CVSS3

4.5

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L

EPSS

0

Percentile

5.1%

A flaw possibility of race condition and incorrect initialization of the
process id was found in the Linux kernel child/parent process
identification handling while filtering signal handlers. A local attacker
is able to abuse this flaw to bypass checks to send any signal to a
privileged process.

Notes

Author Note
mdeslaur possibly Red Hat specific, but bug lists upstream commits, needs investigation
sbeattie The upstream commit is with respect to the race condition, not the improper initialization.
Rows per page:
1-10 of 511

CVSS2

4.4

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:M/Au:N/C:P/I:P/A:P

CVSS3

4.5

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L

EPSS

0

Percentile

5.1%