A flaw possibility of race condition and incorrect initialization of the process id was found in the Linux kernel child/parent process identification handling while filtering signal handlers. A local attacker is able to abuse this flaw to bypass checks to send any signal to a privileged process.
The product does not initialize or incorrectly initializes a resource, which might leave the resource in an unexpected state when it is accessed or used.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Linux_kernel | Linux | * | 5.12 (excluding) |
Linux_kernel | Linux | 5.12 (including) | 5.12 (including) |
Linux_kernel | Linux | 5.12-rc1 (including) | 5.12-rc1 (including) |
Linux_kernel | Linux | 5.12-rc2 (including) | 5.12-rc2 (including) |
Linux_kernel | Linux | 5.12-rc3 (including) | 5.12-rc3 (including) |
Linux_kernel | Linux | 5.12-rc4 (including) | 5.12-rc4 (including) |