CVE-2020-12826

NameCVE-2020-12826
DescriptionA signal access-control issue was discovered in the Linux kernel before 5.6.5, aka CID-7395ea4e65c2. Because exec_id in include/linux/sched.h is only 32 bits, an integer overflow can interfere with a do_notify_parent protection mechanism. A child process can send an arbitrary signal to a parent process in a different security domain. Exploitation limitations include the amount of elapsed time before an integer overflow occurs, and the lack of scenarios where signals to a parent process present a substantial operational threat.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
linux (PTS)jessie3.16.56-1+deb8u1vulnerable
jessie (security)3.16.81-1vulnerable
stretch4.9.210-1vulnerable
stretch (security)4.9.189-3+deb9u2vulnerable
buster4.19.118-2fixed
buster (security)4.19.98-1+deb10u1vulnerable
bullseye, sid5.6.14-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
linuxsource(unstable)5.6.7-1
linuxsourcebuster4.19.118-1

Notes

https://git.kernel.org/linus/d1e7fd6462ca9fc76650fbe6ca800e35b24267da

Search for package or bug name: Reporting problems