A vulnerability exists in io_uring related to zcrx freelist OOB write. The exploit described involves writing a script path to /proc/sys/kernel/modprobe, which directly modifies modprobe_path in kernel memory. This requires CAP_SYS_ADMIN privileges, which can be obtained via CAP_NET_ADMIN in certain container configurations. The potential impact is a container escape.
| Vendor | Product | Versions |
|---|---|---|
| null | — | — |
Marked exploit as available and actively exploited, and added patch information.
Initial creation