7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.2 High
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
0.001 Low
EPSS
Percentile
34.9%
In the Linux kernel 5.5.0 and newer, the bpf verifier
(kernel/bpf/verifier.c) did not properly restrict the register bounds for
32-bit operations, leading to out-of-bounds reads and writes in kernel
memory. The vulnerability also affects the Linux 5.4 stable series,
starting with v5.4.7, as the introducing commit was backported to that
branch. This vulnerability was fixed in 5.6.1, 5.5.14, and 5.4.29. (issue
is aka ZDI-CAN-10780)
Author | Note |
---|---|
sbeattie | introduced by upstream commit 581738a681b6, which was mistakenly backported to upstream stable 5.4 kernel (b4de258dede528f88f401259aab3147fb6da1ddf). Ubuntu’s 5.3 kernels are affected because 5.4 stable backport commits were pulled into Ubuntu’s 5.3 kernels. |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 19.10 | noarch | linux-aws | < 5.3.0-1015.16 | UNKNOWN |
ubuntu | 19.10 | noarch | linux-azure | < 5.3.0-1018.19 | UNKNOWN |
ubuntu | 19.10 | noarch | linux-gcp | < 5.3.0-1016.17 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-gcp-5.3 | < 5.3.0-1016.17~18.04.1 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-hwe | < 5.3.0-45.37~18.04.1 | UNKNOWN |
ubuntu | 19.10 | noarch | linux-kvm | < 5.3.0-1014.15 | UNKNOWN |
ubuntu | 19.10 | noarch | linux-oracle | < 5.3.0-1013.14 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-oracle-5.3 | < 5.3.0-1013.14~18.04.1 | UNKNOWN |
ubuntu | 19.10 | noarch | linux-raspi2 | < 5.3.0-1021.23 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-raspi2-5.3 | < 5.3.0-1021.23~18.04.1 | UNKNOWN |
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8835
git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f2d67fec0b43edce8c416101cdc52e71145b5fef
launchpad.net/bugs/cve/CVE-2020-8835
lore.kernel.org/bpf/[email protected]/T/
nvd.nist.gov/vuln/detail/CVE-2020-8835
security-tracker.debian.org/tracker/CVE-2020-8835
ubuntu.com/security/notices/USN-4313-1
www.openwall.com/lists/oss-security/2020/03/30/3
www.thezdi.com/blog/2020/3/19/pwn2own-2020-day-one-results
www.zerodayinitiative.com/advisories/ZDI-20-350/
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.2 High
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
0.001 Low
EPSS
Percentile
34.9%