CVE-2020-8835
high-risk
Published 2020-04-02
In the Linux kernel 5.5.0 and newer, the bpf verifier (kernel/bpf/verifier.c) did not properly restrict the register bounds for 32-bit operations, leading to out-of-bounds reads and writes in kernel memory. The vulnerability also affects the Linux 5.4 stable series, starting with v5.4.7, as the introducing commit was backported to that branch. This vulnerability was fixed in 5.6.1, 5.5.14, and 5.4.29. (issue is aka ZDI-CAN-10780)
Do I need to act?
!
23.3% chance of exploitation in next 30 days
EPSS score — higher than 77% of all CVEs
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.8/10
High
LOCAL
/ HIGH complexity
Affected Products (20)
8300 Firmware
8700 Firmware
A400 Firmware
Affected Vendors
References (24)
Third Party Advisory
https://security.netapp.com/advisory/ntap-20200430-0004/
Third Party Advisory
https://usn.ubuntu.com/4313-1/
Third Party Advisory
https://usn.ubuntu.com/usn/usn-4313-1
Third Party Advisory
https://www.thezdi.com/blog/2020/3/19/pwn2own-2020-day-one-results
Third Party Advisory
https://security.netapp.com/advisory/ntap-20200430-0004/
and 4 more references
56
/ 100
high-risk
Severity
20/34 · Moderate
Exploitability
14/34 · Moderate
Exposure
22/34 · High