vulnerability

Ubuntu: (Multiple Advisories) (CVE-2020-35508): Linux kernel vulnerabilities

Severity
4
CVSS
(AV:L/AC:M/Au:S/C:P/I:P/A:P)
Published
Feb 25, 2021
Added
Feb 26, 2021
Modified
Jan 28, 2025

Description

A flaw possibility of race condition and incorrect initialization of the process id was found in the Linux kernel child/parent process identification handling while filtering signal handlers. A local attacker is able to abuse this flaw to bypass checks to send any signal to a privileged process.

Solution(s)

ubuntu-upgrade-linux-image-5-6-0-1048-oemubuntu-upgrade-linux-image-5-8-0-1016-raspiubuntu-upgrade-linux-image-5-8-0-1016-raspi-nolpaeubuntu-upgrade-linux-image-5-8-0-1019-kvmubuntu-upgrade-linux-image-5-8-0-1021-oracleubuntu-upgrade-linux-image-5-8-0-1023-azureubuntu-upgrade-linux-image-5-8-0-1023-gcpubuntu-upgrade-linux-image-5-8-0-1024-awsubuntu-upgrade-linux-image-5-8-0-44-genericubuntu-upgrade-linux-image-5-8-0-44-generic-64kubuntu-upgrade-linux-image-5-8-0-44-generic-lpaeubuntu-upgrade-linux-image-5-8-0-44-lowlatencyubuntu-upgrade-linux-image-awsubuntu-upgrade-linux-image-azureubuntu-upgrade-linux-image-gcpubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-64kubuntu-upgrade-linux-image-generic-64k-hwe-20-04ubuntu-upgrade-linux-image-generic-hwe-20-04ubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-generic-lpae-hwe-20-04ubuntu-upgrade-linux-image-gkeubuntu-upgrade-linux-image-kvmubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-lowlatency-hwe-20-04ubuntu-upgrade-linux-image-oem-20-04ubuntu-upgrade-linux-image-oracleubuntu-upgrade-linux-image-raspiubuntu-upgrade-linux-image-raspi-nolpaeubuntu-upgrade-linux-image-virtualubuntu-upgrade-linux-image-virtual-hwe-20-04
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.