CVE-2020-27170
Linux Kernel vulnerability analysis and mitigation

Overview

CVE-2020-27170 was discovered in the Linux kernel before version 5.11.8. The vulnerability exists in kernel/bpf/verifier.c where undesirable out-of-bounds speculation occurs on pointer arithmetic, leading to side-channel attacks that can defeat Spectre mitigations and obtain sensitive information from kernel memory. The issue specifically affects pointer types that do not define a ptr_limit (NVD, OSS Security).

Technical details

The vulnerability stems from a gap in the Linux kernel's mechanism to mitigate speculatively out-of-bounds loads (Spectre mitigation). Unprivileged BPF programs could perform pointer arithmetic on pointer types not defining ptr_limit, which was not protected against out-of-bounds speculation. This could be exploited through BPF programs attached to sockets, allowing attackers to execute speculatively out-of-bounds loads without restrictions (OSS Security). The CVSS v3.1 base score for this vulnerability is 4.7 (Medium) with vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N (NVD).

Impact

The vulnerability allows local unprivileged users to execute side-channel attacks that can extract sensitive information from kernel memory. By bypassing Spectre mitigations, attackers could access contents of kernel memory that should be protected (OSS Security).

Mitigation and workarounds

The vulnerability was fixed in Linux kernel version 5.11.8 through a series of patches. The primary fix prohibits arithmetic operations for pointer types not defining ptr_limit. Additional hardening patches were also provided to address related issues and improve the security of the affected code. Users should upgrade to kernel version 5.11.8 or later (Kernel Changelog, Git Commit).

Community reactions

Multiple Linux distributions responded to this vulnerability by releasing security updates. Fedora issued updates for versions 32, 33, and 34 to address the vulnerability (Fedora Update). Debian also released security updates for affected versions (Debian Update).

Additional resources


SourceThis report was generated using AI

Related Linux Kernel vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-40205HIGH7.8
  • Linux KernelLinux Kernel
  • linux-gcp-5.4
NoYesNov 12, 2025
CVE-2025-40211HIGH7.1
  • Linux KernelLinux Kernel
  • linux-gcp-6.8
NoYesNov 21, 2025
CVE-2025-40206MEDIUM5.5
  • Linux KernelLinux Kernel
  • kernel-zfcpdump-modules-extra
NoYesNov 12, 2025
CVE-2025-40210MEDIUM5.1
  • Linux KernelLinux Kernel
  • kernel-rt-64k-modules
NoYesNov 21, 2025
CVE-2025-40212N/AN/A
  • Linux KernelLinux Kernel
  • linux-azure-6.14
NoYesNov 24, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management