CVE 2020-35508
A flaw possibility of race condition and incorrect initialization of the process id was found in the Linux kernel child/parent process identification handling while filtering signal handlers. A local attacker is able to abuse this flaw to bypass checks to send any signal to a privileged process.
Related bugs and status
CVE-2020-35508 (Candidate) is related to these bugs:
Bug #1908499: udpgro.sh in net from ubuntu_kernel_selftests seems not reflecting sub-test result
Bug #1909453: S3 stress test fails with amdgpu errors
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1909453 | S3 stress test fails with amdgpu errors | linux-oem-5.6 (Ubuntu) | Undecided | Invalid | ||
1909453 | S3 stress test fails with amdgpu errors | linux-oem-5.6 (Ubuntu Focal) | Undecided | Fix Released | ||
1909453 | S3 stress test fails with amdgpu errors | HWE Next | Undecided | Fix Released |
Bug #1913153: focal/linux-oem-5.6: 5.6.0-1048.52 -proposed tracker
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
1913153 | focal/linux-oem-5.6: 5.6.0-1048.52 -proposed tracker | Kernel SRU Workflow | Medium | Fix Released | ||
1913153 | focal/linux-oem-5.6: 5.6.0-1048.52 -proposed tracker | Kernel SRU Workflow automated-testing | Medium | Fix Released | ||
1913153 | focal/linux-oem-5.6: 5.6.0-1048.52 -proposed tracker | Kernel SRU Workflow certification-testing | Medium | Fix Released | ||
1913153 | focal/linux-oem-5.6: 5.6.0-1048.52 -proposed tracker | Kernel SRU Workflow kernel-signoff | Medium | Fix Released | ||
1913153 | focal/linux-oem-5.6: 5.6.0-1048.52 -proposed tracker | Kernel SRU Workflow prepare-package | Medium | Fix Released | ||
1913153 | focal/linux-oem-5.6: 5.6.0-1048.52 -proposed tracker | Kernel SRU Workflow prepare-package-lrm | Medium | Fix Released | ||
1913153 | focal/linux-oem-5.6: 5.6.0-1048.52 -proposed tracker | Kernel SRU Workflow prepare-package-meta | Medium | Fix Released | ||
1913153 | focal/linux-oem-5.6: 5.6.0-1048.52 -proposed tracker | Kernel SRU Workflow prepare-package-signed | Medium | Fix Released | ||
1913153 | focal/linux-oem-5.6: 5.6.0-1048.52 -proposed tracker | Kernel SRU Workflow promote-to-proposed | Medium | Fix Released | ||
1913153 | focal/linux-oem-5.6: 5.6.0-1048.52 -proposed tracker | Kernel SRU Workflow promote-to-security | Medium | Fix Released | ||
1913153 | focal/linux-oem-5.6: 5.6.0-1048.52 -proposed tracker | Kernel SRU Workflow promote-to-updates | Medium | Fix Released | ||
1913153 | focal/linux-oem-5.6: 5.6.0-1048.52 -proposed tracker | Kernel SRU Workflow regression-testing | Medium | Fix Released | ||
1913153 | focal/linux-oem-5.6: 5.6.0-1048.52 -proposed tracker | Kernel SRU Workflow security-signoff | Medium | Fix Released | ||
1913153 | focal/linux-oem-5.6: 5.6.0-1048.52 -proposed tracker | Kernel SRU Workflow verification-testing | Medium | Fix Released | ||
1913153 | focal/linux-oem-5.6: 5.6.0-1048.52 -proposed tracker | linux-oem-5.6 (Ubuntu Focal) | Medium | Fix Released |
See the
CVE page on Mitre.org
for more details.