{"uuid": "2b12c51c-d7c8-4130-a951-fb563e3e7e6a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-8835", "type": "published-proof-of-concept", "source": "https://t.me/techpwnews/469", "content": "CVE-2020-8835: Linux Kernel Privilege Escalation via Improper eBPF Program Verification\n\nThis blog explains the technical details of an exploit using the Linux eBPF feature to achieve local privilege escalation. Due to the nature of the bug(s), which are rather subtle misbehaviors of a safety-critical feature called the \u201cverifier\u201d, some explanations about the inner workings of eBPF need to be provided first. It may be helpful to have the kernel source (kernel/bpf/verifier.c in particular) as a reference alongside these explanations. This bug h...\n\nContinue reading at Zero Day Initiative - Blog", "creation_timestamp": "2020-04-25T23:00:39.000000Z"}