Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Ubuntu USN |
USN-4313-1 | Linux kernel vulnerability |
Solution
Revert commit 581738a681b6 ("bpf: Provide better register bounds after jmp32 instructions").
Workaround
Mitigation for this vulnerability is available by setting the kernel.unprivileged_bpf_disabled sysctl to 1: $ sudo sysctl kernel.unprivileged_bpf_disabled=1 $ echo kernel.unprivileged_bpf_disabled=1 | sudo tee /etc/sysctl.d/90-CVE-2020-8835.conf This issue is also mitigated on systems that use secure boot with the kernel lockdown feature which blocks BPF program loading.
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: canonical
Published:
Updated: 2024-09-17T02:15:48.820Z
Reserved: 2020-02-10T00:00:00
Link: CVE-2020-8835
No data.
Status : Modified
Published: 2020-04-02T18:15:18.943
Modified: 2024-11-21T05:39:32.163
Link: CVE-2020-8835
OpenCVE Enrichment
No data.
Ubuntu USN