Executive Summary

Informations
Name CVE-2020-35508 First vendor Publication 2021-03-26
Vendor Cve Last vendor Modification 2023-02-12

Security-Database Scoring CVSS v3

Cvss vector : CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
Overall CVSS Score 4.5
Base Score 4.5 Environmental Score 4.5
impact SubScore 3.4 Temporal Score 4.5
Exploitabality Sub Score 1
 
Attack Vector Local Attack Complexity High
Privileges Required Low User Interaction None
Scope Unchanged Confidentiality Impact Low
Integrity Impact Low Availability Impact Low
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:M/Au:N/C:P/I:P/A:P)
Cvss Base Score 4.4 Attack Range Local
Cvss Impact Score 6.4 Attack Complexity Medium
Cvss Expoit Score 3.4 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

A flaw possibility of race condition and incorrect initialization of the process id was found in the Linux kernel child/parent process identification handling while filtering signal handlers. A local attacker is able to abuse this flaw to bypass checks to send any signal to a privileged process.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35508

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-665 Improper Initialization

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1
Os 1
Os 3421
Os 1

Sources (Detail)

Source Url
CONFIRM https://security.netapp.com/advisory/ntap-20210513-0006/
MISC https://bugzilla.redhat.com/show_bug.cgi?id=1902724
https://github.com/torvalds/linux/commit/b4e00444cab4c3f3fec876dc0cccc8cbb0d1...

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
Date Informations
2024-03-12 13:08:11
  • Multiple Updates
2024-02-02 02:16:41
  • Multiple Updates
2024-02-01 12:21:07
  • Multiple Updates
2024-01-12 02:09:35
  • Multiple Updates
2023-12-29 02:08:12
  • Multiple Updates
2023-11-22 02:07:44
  • Multiple Updates
2023-09-29 13:02:39
  • Multiple Updates
2023-09-05 13:11:06
  • Multiple Updates
2023-09-05 01:20:44
  • Multiple Updates
2023-09-02 13:09:53
  • Multiple Updates
2023-09-02 01:21:01
  • Multiple Updates
2023-08-12 13:14:42
  • Multiple Updates
2023-08-12 01:20:18
  • Multiple Updates
2023-08-11 13:07:41
  • Multiple Updates
2023-08-11 01:20:56
  • Multiple Updates
2023-08-06 13:05:55
  • Multiple Updates
2023-08-06 01:20:06
  • Multiple Updates
2023-08-04 13:06:15
  • Multiple Updates
2023-08-04 01:20:25
  • Multiple Updates
2023-07-14 13:06:16
  • Multiple Updates
2023-07-14 01:20:14
  • Multiple Updates
2023-06-06 12:59:12
  • Multiple Updates
2023-04-13 01:55:32
  • Multiple Updates
2023-03-29 02:08:49
  • Multiple Updates
2023-03-28 12:20:28
  • Multiple Updates
2023-03-25 01:55:21
  • Multiple Updates
2023-02-13 05:27:36
  • Multiple Updates
2023-02-03 05:27:41
  • Multiple Updates
2023-01-25 01:55:29
  • Multiple Updates
2023-01-20 01:55:05
  • Multiple Updates
2022-10-11 12:59:07
  • Multiple Updates
2022-10-11 01:20:00
  • Multiple Updates
2022-09-09 01:54:45
  • Multiple Updates
2022-08-05 21:27:40
  • Multiple Updates
2022-03-11 01:50:12
  • Multiple Updates
2022-02-01 01:45:25
  • Multiple Updates
2021-12-17 00:23:16
  • Multiple Updates
2021-12-11 12:46:33
  • Multiple Updates
2021-12-11 01:43:38
  • Multiple Updates
2021-08-26 12:39:20
  • Multiple Updates
2021-08-24 01:39:54
  • Multiple Updates
2021-08-19 12:40:14
  • Multiple Updates
2021-06-05 01:41:12
  • Multiple Updates
2021-06-04 01:36:05
  • Multiple Updates
2021-06-03 01:36:54
  • Multiple Updates
2021-05-29 01:36:40
  • Multiple Updates
2021-05-25 12:38:07
  • Multiple Updates
2021-05-19 09:23:16
  • Multiple Updates
2021-05-14 05:22:59
  • Multiple Updates
2021-05-04 13:52:56
  • Multiple Updates
2021-04-22 03:04:20
  • Multiple Updates
2021-04-12 21:23:13
  • Multiple Updates
2021-03-31 21:23:13
  • Multiple Updates
2021-03-26 21:23:11
  • First insertion