Bug 1889477 (CVE-2020-27194) - CVE-2020-27194 kernel: bounds tracking issue during use of 64-bit values in scalar32_min_max_or function in kernel/bpf/verifier.c
Summary: CVE-2020-27194 kernel: bounds tracking issue during use of 64-bit values in s...
Alias: CVE-2020-27194
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
Depends On: 1889479 1894219 1894220 1894221 1894222 1894224
Blocks: 1889480
TreeView+ depends on / blocked
Reported: 2020-10-19 18:14 UTC by Guilherme de Almeida Suckevicz
Modified: 2021-02-16 19:05 UTC (History)
46 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
An out-of-bounds access flaw was found in the Linux kernel’s implementation of the eBPF (Berkeley Packet Filter) code verifier, where an incorrect register bounds calculation occurs while in use of 64-bit values with scalar32_min_max_or (that is BPF_OR). This flaw allows an unprivileged local user (until param kernel.unprivileged_bpf_disabled is set) to have arbitrary read/write access to the kernel memory or escalate their privileges on the system.
Clone Of:
Last Closed: 2020-11-05 08:21:16 UTC

Attachments (Terms of Use)

Description Guilherme de Almeida Suckevicz 2020-10-19 18:14:53 UTC
An issue was discovered in the Linux kernel before 5.8.15. scalar32_min_max_or in kernel/bpf/verifier.c mishandles bounds tracking during use of 64-bit values.

Reference and upstream patch:

Comment 1 Guilherme de Almeida Suckevicz 2020-10-19 18:16:08 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 1889479]

Comment 3 Justin M. Forbes 2020-10-20 12:23:28 UTC
This was fixed for Fedora with the 5.8.15 stable kernel updates.

Comment 14 Product Security DevOps Team 2020-11-05 08:21:16 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):


Comment 16 RaTasha Tillery-Smith 2020-11-11 17:04:56 UTC

This flaw is rated as having a Moderate impact because in the default configuration, the issue can only be triggered by a privileged local user.

Comment 17 RaTasha Tillery-Smith 2020-11-11 17:04:57 UTC

For Red Hat Enterprise Linux, the Berkeley Packet Filter is available only for privileged users. However, if enabled for an unprivileged user, the mitigation is to disable unprivileged access to the BPF using the following sysctl: kernel.unprivileged_bpf_disabled=1.

Note You need to log in before you can comment on or make changes to this bug.