{"id":"CVE-2020-27171","details":"An issue was discovered in the Linux kernel before 5.11.8. kernel/bpf/verifier.c has an off-by-one error (with a resultant integer underflow) affecting out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory, aka CID-10d2bb2e6b1d.","aliases":["A-183840808","PUB-A-183840808"],"modified":"2026-03-13T00:38:07.243812Z","published":"2021-03-20T22:15:12Z","related":["MGASA-2021-0151","MGASA-2021-0152","SUSE-SU-2021:1175-1","SUSE-SU-2021:1176-1","SUSE-SU-2021:1177-1","SUSE-SU-2021:1210-1","SUSE-SU-2021:1211-1","SUSE-SU-2021:1238-1","SUSE-SU-2021:1573-1","SUSE-SU-2021:1596-1","SUSE-SU-2021:1624-1","SUSE-SU-2021:1625-1","SUSE-SU-2021:1975-1","SUSE-SU-2021:1977-1","openSUSE-SU-2021:0532-1","openSUSE-SU-2021:0758-1","openSUSE-SU-2021:1975-1","openSUSE-SU-2021:1977-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T2S3I4SLRNRUQDOFYUS6IUAZMQNMPNLG/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FB6LUXPEIRLZH32YXWZVEZAD4ZL6SDK2/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QRTPQE73ANG7D6M4L4PK5ZQDPO4Y2FVD/"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2021/03/24/5"},{"type":"ADVISORY","url":"http://packetstormsecurity.com/files/162117/Kernel-Live-Patch-Security-Notice-LSN-0075-1.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html"},{"type":"FIX","url":"https://www.openwall.com/lists/oss-security/2021/03/19/3"},{"type":"FIX","url":"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.11.8"},{"type":"FIX","url":"https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf.git/patch/?id=10d2bb2e6b1d8c4576c56a748f697dbeb8388899"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-27171.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"5.11.8"}]},{"events":[{"introduced":"0"},{"last_affected":"32"}]},{"events":[{"introduced":"0"},{"last_affected":"33"}]},{"events":[{"introduced":"0"},{"last_affected":"34"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"14.04"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"18.04"}]},{"events":[{"introduced":"0"},{"last_affected":"20.04"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H"}]}