Description
An issue was discovered in the Linux kernel before 5.11.8. kernel/bpf/verifier.c performs undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory, aka CID-f232326f6966. This affects pointer types that do not define a ptr_limit.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2610-1 | linux-4.19 security update |
EUVD |
EUVD-2020-19694 | An issue was discovered in the Linux kernel before 5.11.8. kernel/bpf/verifier.c performs undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory, aka CID-f232326f6966. This affects pointer types that do not define a ptr_limit. |
Ubuntu USN |
USN-4887-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-4890-1 | Linux kernel vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T16:11:35.904Z
Reserved: 2020-10-16T00:00:00.000Z
Link: CVE-2020-27170
No data.
Status : Modified
Published: 2021-03-20T22:15:11.940
Modified: 2024-11-21T05:20:48.580
Link: CVE-2020-27170
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN