Логотип exploitDog
bind:CVE-2020-12826
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-12826

Количество 9

Количество 9

ubuntu логотип

CVE-2020-12826

около 5 лет назад

A signal access-control issue was discovered in the Linux kernel before 5.6.5, aka CID-7395ea4e65c2. Because exec_id in include/linux/sched.h is only 32 bits, an integer overflow can interfere with a do_notify_parent protection mechanism. A child process can send an arbitrary signal to a parent process in a different security domain. Exploitation limitations include the amount of elapsed time before an integer overflow occurs, and the lack of scenarios where signals to a parent process present a substantial operational threat.

CVSS3: 5.3
EPSS: Низкий
redhat логотип

CVE-2020-12826

около 5 лет назад

A signal access-control issue was discovered in the Linux kernel before 5.6.5, aka CID-7395ea4e65c2. Because exec_id in include/linux/sched.h is only 32 bits, an integer overflow can interfere with a do_notify_parent protection mechanism. A child process can send an arbitrary signal to a parent process in a different security domain. Exploitation limitations include the amount of elapsed time before an integer overflow occurs, and the lack of scenarios where signals to a parent process present a substantial operational threat.

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2020-12826

около 5 лет назад

A signal access-control issue was discovered in the Linux kernel before 5.6.5, aka CID-7395ea4e65c2. Because exec_id in include/linux/sched.h is only 32 bits, an integer overflow can interfere with a do_notify_parent protection mechanism. A child process can send an arbitrary signal to a parent process in a different security domain. Exploitation limitations include the amount of elapsed time before an integer overflow occurs, and the lack of scenarios where signals to a parent process present a substantial operational threat.

CVSS3: 5.3
EPSS: Низкий
msrc логотип

CVE-2020-12826

больше 4 лет назад

CVSS3: 5.3
EPSS: Низкий
debian логотип

CVE-2020-12826

около 5 лет назад

A signal access-control issue was discovered in the Linux kernel befor ...

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-wxmm-482m-cm8h

около 3 лет назад

A signal access-control issue was discovered in the Linux kernel before 5.6.5, aka CID-7395ea4e65c2. Because exec_id in include/linux/sched.h is only 32 bits, an integer overflow can interfere with a do_notify_parent protection mechanism. A child process can send an arbitrary signal to a parent process in a different security domain. Exploitation limitations include the amount of elapsed time before an integer overflow occurs, and the lack of scenarios where signals to a parent process present a substantial operational threat.

EPSS: Низкий
fstec логотип

BDU:2021-00466

около 5 лет назад

Уязвимость функции exec_id ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

CVSS3: 5.3
EPSS: Низкий
oracle-oval логотип

ELSA-2020-4431

больше 4 лет назад

ELSA-2020-4431: kernel security, bug fix, and enhancement update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2020-4060

больше 4 лет назад

ELSA-2020-4060: kernel security, bug fix, and enhancement update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2020-12826

A signal access-control issue was discovered in the Linux kernel before 5.6.5, aka CID-7395ea4e65c2. Because exec_id in include/linux/sched.h is only 32 bits, an integer overflow can interfere with a do_notify_parent protection mechanism. A child process can send an arbitrary signal to a parent process in a different security domain. Exploitation limitations include the amount of elapsed time before an integer overflow occurs, and the lack of scenarios where signals to a parent process present a substantial operational threat.

CVSS3: 5.3
0%
Низкий
около 5 лет назад
redhat логотип
CVE-2020-12826

A signal access-control issue was discovered in the Linux kernel before 5.6.5, aka CID-7395ea4e65c2. Because exec_id in include/linux/sched.h is only 32 bits, an integer overflow can interfere with a do_notify_parent protection mechanism. A child process can send an arbitrary signal to a parent process in a different security domain. Exploitation limitations include the amount of elapsed time before an integer overflow occurs, and the lack of scenarios where signals to a parent process present a substantial operational threat.

CVSS3: 5.3
0%
Низкий
около 5 лет назад
nvd логотип
CVE-2020-12826

A signal access-control issue was discovered in the Linux kernel before 5.6.5, aka CID-7395ea4e65c2. Because exec_id in include/linux/sched.h is only 32 bits, an integer overflow can interfere with a do_notify_parent protection mechanism. A child process can send an arbitrary signal to a parent process in a different security domain. Exploitation limitations include the amount of elapsed time before an integer overflow occurs, and the lack of scenarios where signals to a parent process present a substantial operational threat.

CVSS3: 5.3
0%
Низкий
около 5 лет назад
msrc логотип
CVSS3: 5.3
0%
Низкий
больше 4 лет назад
debian логотип
CVE-2020-12826

A signal access-control issue was discovered in the Linux kernel befor ...

CVSS3: 5.3
0%
Низкий
около 5 лет назад
github логотип
GHSA-wxmm-482m-cm8h

A signal access-control issue was discovered in the Linux kernel before 5.6.5, aka CID-7395ea4e65c2. Because exec_id in include/linux/sched.h is only 32 bits, an integer overflow can interfere with a do_notify_parent protection mechanism. A child process can send an arbitrary signal to a parent process in a different security domain. Exploitation limitations include the amount of elapsed time before an integer overflow occurs, and the lack of scenarios where signals to a parent process present a substantial operational threat.

0%
Низкий
около 3 лет назад
fstec логотип
BDU:2021-00466

Уязвимость функции exec_id ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

CVSS3: 5.3
0%
Низкий
около 5 лет назад
oracle-oval логотип
ELSA-2020-4431

ELSA-2020-4431: kernel security, bug fix, and enhancement update (MODERATE)

больше 4 лет назад
oracle-oval логотип
ELSA-2020-4060

ELSA-2020-4060: kernel security, bug fix, and enhancement update (IMPORTANT)

больше 4 лет назад

Уязвимостей на страницу