CVE-2020-8835
HIGHLinux kernel <5.6.1, <5.5.14, <5.4.29 - Memory Corruption
Title source: llmDescription
In the Linux kernel 5.5.0 and newer, the bpf verifier (kernel/bpf/verifier.c) did not properly restrict the register bounds for 32-bit operations, leading to out-of-bounds reads and writes in kernel memory. The vulnerability also affects the Linux 5.4 stable series, starting with v5.4.7, as the introducing commit was backported to that branch. This vulnerability was fixed in 5.6.1, 5.5.14, and 5.4.29. (issue is aka ZDI-CAN-10780)
Exploits (6)
nomisec
WORKING POC
4 stars
by snappyJack · poc
https://github.com/snappyJack/Rick_write_exp_CVE-2020-8835
nomisec
WRITEUP
2 stars
by digamma-ai · poc
https://github.com/digamma-ai/CVE-2020-8835-verification
References (12)
Core 12
Core References
Third Party Advisory vendor-advisory
x_refsource_ubuntu
https://usn.ubuntu.com/4313-1/
Third Party Advisory x_refsource_misc
https://www.thezdi.com/blog/2020/3/19/pwn2own-2020-day-one-results
Mailing List x_refsource_misc
https://lore.kernel.org/bpf/20200330160324.15259-1-daniel%40iogearbox.net/T/
Mailing List, Patch, Third Party Advisory x_refsource_misc
https://www.openwall.com/lists/oss-security/2020/03/30/3
Third Party Advisory x_refsource_misc
https://usn.ubuntu.com/usn/usn-4313-1
Patch, Vendor Advisory x_refsource_misc
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net-next.git/commit/?id=f2d67fec0b43edce8c416101cdc52e71145b5fef
Patch, Vendor Advisory x_refsource_misc
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f2d67fec0b43edce8c416101cdc52e71145b5fef
Mailing List, Third Party Advisory vendor-advisory
x_refsource_fedora
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F7OONYGMSYBEFHLHZJK3GOI5Z553G4LD/
Mailing List, Third Party Advisory vendor-advisory
x_refsource_fedora
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YXBWSHZ6DJIZVXKXGZPK6QPFCY7VKZEG/
Mailing List, Third Party Advisory vendor-advisory
x_refsource_fedora
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TF4PQZBEPNXDSK5DOBMW54OCLP25FTCD/
Third Party Advisory x_refsource_confirm
https://security.netapp.com/advisory/ntap-20200430-0004/
Exploit, Mailing List, Third Party Advisory mailing-list
x_refsource_mlist
http://www.openwall.com/lists/oss-security/2021/07/20/1
Scores
CVSS v3
7.8
EPSS
0.2327
EPSS Percentile
96.0%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
Details
CWE
CWE-125
CWE-787
Status
published
Products (30)
canonical/ubuntu_linux
18.04
canonical/ubuntu_linux
19.10
fedoraproject/fedora
30
fedoraproject/fedora
31
fedoraproject/fedora
32
linux/linux_kernel
5.4.7 - 5.4.29
netapp/8300_firmware
netapp/8700_firmware
netapp/a220_firmware
netapp/a320_firmware
... and 20 more
Published
Apr 02, 2020
Tracked Since
Feb 18, 2026