A use-after-free flaw was found in the Linux kernel’s io_uring subsystem in the way a user sets up a ring with IORING_SETUP_IOPOLL with more than one task completing submissions on this ring. This flaw allows a local user to crash or escalate their privileges on the system.
No PoCs from references.
- https://github.com/0xor0ne/awesome-list
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Jalexander798/JA_Tools-Cybersecurity-Resource-2
- https://github.com/N1ghtu/RWCTF6th-RIPTC
- https://github.com/RetSpill/RetSpill_demo
- https://github.com/bachkhoasoft/awesome-list-ks
- https://github.com/kdn111/linux-kernel-exploitation
- https://github.com/khanhdn111/linux-kernel-exploitation
- https://github.com/khanhdz-06/linux-kernel-exploitation
- https://github.com/khanhdz191/linux-kernel-exploitation
- https://github.com/khanhhdz/linux-kernel-exploitation
- https://github.com/khanhhdz06/linux-kernel-exploitation
- https://github.com/khanhnd123/linux-kernel-exploitation
- https://github.com/khnhdz/linux-kernel-exploitation
- https://github.com/knd06/linux-kernel-exploitation
- https://github.com/ndk06/linux-kernel-exploitation
- https://github.com/ndk191/linux-kernel-exploitation
- https://github.com/nightuhu/RWCTF6th-RIPTC
- https://github.com/scratchadams/Heap-Resources
- https://github.com/ssr-111/linux-kernel-exploitation
- https://github.com/wkhnh06/linux-kernel-exploitation
- https://github.com/xairy/linux-kernel-exploitation