Metrics
Affected Vendors & Products
Solution
Revert commit 581738a681b6 ("bpf: Provide better register bounds after jmp32 instructions").
Workaround
Mitigation for this vulnerability is available by setting the kernel.unprivileged_bpf_disabled sysctl to 1: $ sudo sysctl kernel.unprivileged_bpf_disabled=1 $ echo kernel.unprivileged_bpf_disabled=1 | sudo tee /etc/sysctl.d/90-CVE-2020-8835.conf This issue is also mitigated on systems that use secure boot with the kernel lockdown feature which blocks BPF program loading.
No history.

Status: PUBLISHED
Assigner: canonical
Published:
Updated: 2024-09-17T02:15:48.820Z
Reserved: 2020-02-10T00:00:00
Link: CVE-2020-8835

No data.

Status : Modified
Published: 2020-04-02T18:15:18.943
Modified: 2024-11-21T05:39:32.163
Link: CVE-2020-8835


No data.