The eBPF ALU32 bounds tracking for bitwise ops (AND, OR and XOR) in the Linux kernel did not properly update 32-bit bounds, which could be turned into out of bounds reads and writes in the Linux kernel and therefore, arbitrary code execution.
Compile: `gcc -o pwn pwn.c && gcc -o exploit exploit.c`
[4.0K] /data/pocs/e56a5f6d9c469bcdf28c15645b7410190e7e5ea7
├── [6.5K] bpf_insn.h
├── [ 11K] exploit.c
├── [ 158] pwn.c
└── [ 301] README.md
0 directories, 4 files