A bug in the eBPF Verifier branch pruning logic can lead to unsafe code paths being incorrectly marked as safe. As demonstrated in the exploitation section, this can be leveraged to get arbitrary read/write in kernel memory, leading to local privilege escalation and Container escape.
136ce639cfd15a56ffb726b157cb063671eb2afeb14923a1653b8bdfd103c611