MEDIUM
kernel/bpf/verifier.c in the Linux kernel before 4.20.6 performs undesirable out-of-bounds speculation on pointer arithmetic in various cases, including cases of different branches with different state or limits to sanitize, leading to side-channel attacks.
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00052.html
http://www.securityfocus.com/bid/106827
https://bugs.chromium.org/p/project-zero/issues/detail?id=1711
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.6
https://github.com/torvalds/linux/commit/979d63d50c0c0f7bc537bf821e056cc9fe5abd38
https://github.com/torvalds/linux/commit/d3bd7413e0ca40b60cf60d4003246d067cafdeda
https://support.f5.com/csp/article/K43030517
https://support.f5.com/csp/article/K43030517?utm_source=f5support&utm_medium=RSS
https://usn.ubuntu.com/3930-1/
https://usn.ubuntu.com/3930-2/
Source: MITRE
Published: 2019-02-01
Updated: 2019-09-24
Type: CWE-189
Base Score: 4.7
Vector: AV:L/AC:M/Au:N/C:C/I:N/A:N
Impact Score: 6.9
Exploitability Score: 3.4
Severity: MEDIUM
Base Score: 5.6
Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
Impact Score: 4
Exploitability Score: 1.1
Severity: MEDIUM