pkg/sentry/kernel/shm/shm.go in Google gVisor before 2018-11-01 allows attackers to overwrite memory locations in processes running as root (but not escape the sandbox) via vectors involving IPC_RMID shmctl calls, because reference counting is mishandled.
- https://justi.cz/security/2018/11/14/gvisor-lpe.html
No PoCs found on GitHub currently.