Incorrect verifier pruning in BPF in Linux Kernel >=5.4 leads to unsafecode paths being incorrectly marked as safe, resulting in arbitrary read/write inkernel memory, lateral privilege escalation, and container escape.
No PoCs from references.
- https://github.com/ARPSyndicate/cve-scores
- https://github.com/Coolaid003/Security-Research
- https://github.com/Dikens88/hopp
- https://github.com/SDUzbh/buzzer-klee
- https://github.com/Snoopy-Sec/Localroot-ALL-CVE
- https://github.com/Soil-Security/awesome-ebpf
- https://github.com/a-ramses/security-research
- https://github.com/google/buzzer
- https://github.com/google/security-research
- https://github.com/jbeagles8755a0/security-research
- https://github.com/kherrick/lobsters
- https://github.com/letsr00t/CVE-2023-2163
- https://github.com/mrTomatolegit/intern-bpf-sum2025
- https://github.com/nisadevi11/Localroot-ALL-CVE
- https://github.com/shannonmullins/hopp
- https://github.com/tylzars/awesome-vrre-writeups
- https://github.com/xairy/linux-kernel-exploitation