No analysis available yet.
Vendor Solution
Revert commit 581738a681b6 ("bpf: Provide better register bounds after jmp32 instructions").
Vendor Workaround
Mitigation for this vulnerability is available by setting the kernel.unprivileged_bpf_disabled sysctl to 1: $ sudo sysctl kernel.unprivileged_bpf_disabled=1 $ echo kernel.unprivileged_bpf_disabled=1 | sudo tee /etc/sysctl.d/90-CVE-2020-8835.conf This issue is also mitigated on systems that use secure boot with the kernel lockdown feature which blocks BPF program loading.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Ubuntu USN |
USN-4313-1 | Linux kernel vulnerability |
No history.
Subscriptions
Status: PUBLISHED
Assigner: canonical
Published:
Updated: 2024-09-17T02:15:48.820Z
Reserved: 2020-02-10T00:00:00.000Z
Link: CVE-2020-8835
No data.
Status : Modified
Published: 2020-04-02T18:15:18.943
Modified: 2024-11-21T05:39:32.163
Link: CVE-2020-8835
OpenCVE Enrichment
No data.
Ubuntu USN