CVE-2020-35508 PUBLISHED

A flaw possibility of race condition and incorrect initialization of the process id was found in the Linux kernel child/parent process identification handling while filtering signal handlers. A local attacker is able to abuse this flaw to bypass checks to send any signal to a privileged process.

EPSS 0.05% · 16.4th percentile

Risk Scores

EPSS Score
0.05%
16.4th percentile

Affected Products

VendorProductVersions
Ubuntu:Pro:FIPS-updates:18.04:LTSlinux-azure-fips4.15.0-2007.8, 4.15.0-2006.7, 0
Ubuntu:20.04:LTSlinux-raspi25.3.0-1014.16, 0, 5.4.0-1004.4
Ubuntu:20.04:LTSlinux-riscv-5.85.8.0-14.16~20.04.3, 5.8.0-16.18~20.04.1, 5.8.0-14.16~20.04.1
Ubuntu:18.04:LTSlinux-kvm4.15.0-1039.39, 4.15.0-1038.38, 4.15.0-1036.36
Ubuntu:16.04:LTSlinux-hwe4.13.0-32.35~16.04.1, 4.13.0-36.40~16.04.1, 4.13.0-38.43~16.04.1
Ubuntu:16.04:LTSlinux-raspi24.4.0-1019.25, 4.4.0-1106.114, 4.4.0-1104.112
Ubuntu:18.04:LTSlinux-snapdragon4.15.0-1087.95, 4.15.0-1084.92, 4.15.0-1086.94
Ubuntu:18.04:LTSlinux-gke-5.45.4.0-1030.32~18.04.1, 5.4.0-1032.34~18.04.1, 0
Ubuntu:Pro:14.04:LTSlinux3.13.0-79.123, 3.13.0-83.127, 3.13.0-85.129
Ubuntu:16.04:LTSlinux-aws4.4.0-1094.105, 4.4.0-1054.63, 4.4.0-1055.64
Ubuntu:18.04:LTSlinux-aws-5.05.0.0-1023.26~18.04.1, 5.0.0-1022.25~18.04.1, 5.0.0-1021.24~18.04.1
Ubuntu:20.04:LTSlinux5.3.0-24.26, 5.3.0-18.19, 0
Ubuntu:Pro:FIPS:20.04:LTSlinux-gcp-fips0, 5.4.0-1021.21+fips1
Ubuntu:Pro:FIPS-updates:20.04:LTSlinux-gcp-fips5.4.0-1021.21+fips1, 0
Ubuntu:18.04:LTSlinux-oracle-5.05.0.0-1013.18, 5.0.0-1007.12~18.04.1, 5.0.0-1008.13~18.04.1
Ubuntu:18.04:LTSlinux-oracle-5.45.4.0-1025.25~18.04.1, 5.4.0-1033.35, 5.4.0-1030.32~18.04.1
Ubuntu:18.04:LTSlinux-oem4.15.0-1012.15, 4.15.0-1103.114, 4.15.0-1102.113
Ubuntu:20.04:LTSlinux-kvm5.4.0-1011.11, 5.4.0-1015.15, 5.3.0-1003.3
Ubuntu:16.04:LTSlinux-kvm4.4.0-1040.46, 4.4.0-1039.45, 4.4.0-1038.44
Ubuntu:18.04:LTSlinux-azure-4.154.15.0-1092.102, 4.15.0-1091.101, 4.15.0-1089.99

…and 55 more

Timeline

References

Open in Interactive Console →