Related Vulnerabilities: CVE-2020-27170  

A gap in the Linux kernel mechanism to mitigate speculatively out-of-bounds loads (Spectre mitigation) has been identified. Unprivileged BPF programs running on affected systems can bypass the protection and execute speculatively out-of-bounds loads from any location within the kernel memory. This can be abused to extract contents of kernel memory via side-channel. The identified gap is that unprivileged BPF programs are allowed to perform pointer arithmetic on particular pointer types not defining ptr_limit. Pointer arithmetic on such pointer types is not protected against out-of-bounds speculation.

Severity Medium

Remote No

Type Information disclosure

Description

A gap in the Linux kernel mechanism to mitigate speculatively out-of-bounds loads (Spectre mitigation) has been identified. Unprivileged BPF programs running on affected systems can bypass the protection and execute speculatively out-of-bounds loads from any location within the kernel memory. This can be abused to extract contents of kernel memory via side-channel. The identified gap is that unprivileged BPF programs are allowed to perform pointer arithmetic on particular pointer types not defining ptr_limit. Pointer arithmetic on such pointer types is not protected against out-of-bounds speculation.

AVG-1714 linux-lts 5.10.24-1 Medium Vulnerable

AVG-1713 linux-zen 5.11.7.zen1-1 Medium Vulnerable

AVG-1712 linux-hardened 5.11.7.hardened1-1 Medium Vulnerable

AVG-1711 linux 5.11.7.arch4-1 Medium Vulnerable

https://www.openwall.com/lists/oss-security/2021/03/19/2
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f232326f6966cf2a1d1db7bc917a4ce5f9f55f76