{"vulnerability": "CVE-2022-29582", "sightings": [{"uuid": "d7a0e883-ec62-4d88-bdd5-8fac2acee167", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-29582", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/2852", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2022\n\u63cf\u8ff0\uff1aExploit for CVE-2022-29582 targeting Google's Kernel CTF\nURL\uff1ahttps://github.com/Ruia-ruia/CVE-2022-29582-Exploit\n\n\u6807\u7b7e\uff1a#CVE-2022", "creation_timestamp": "2022-08-04T18:45:50.000000Z"}, {"uuid": "a69c52a9-8f48-4f73-87e1-0bf7baf47c08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-29582", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/2864", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2022\n\u63cf\u8ff0\uff1aExploit for CVE-2022-29582 targeting Google's Kernel CTF\nURL\uff1ahttps://github.com/Noxtal/follina\n\n\u6807\u7b7e\uff1a#CVE-2022", "creation_timestamp": "2022-08-07T00:18:15.000000Z"}, {"uuid": "c8f2d8c0-5142-4e4e-b8f9-31b04a3336c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-29582", "type": "published-proof-of-concept", "source": "https://t.me/linkersec/181", "content": "CVE-2022-29582, an io_uring vulnerability\n\nA detailed and well-written article by Awarau and David Bouman about exploiting a slab use-after-free vulnerability in the io_uring subsystem.\n\nThe exploit leverages a cross-cache attack and msg_msg spraying to overwrite a tls_context object and execute a ROP chain to gain root.", "creation_timestamp": "2022-08-11T15:36:32.000000Z"}, {"uuid": "c728f530-3970-4a9a-8f65-04f9e9b57a28", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-29582", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/6816", "content": "#exploit\n1. CVE-2022-29582:\nAn io_uring vulnerability\nhttps://ruia-ruia.github.io/2022/08/05/CVE-2022-29582-io-uring\n\n2. CVE-2022-29021, CVE-2022-29022, CVE-2022-29023:\nBuffer overflow in the\u00a0OpenRazer\u00a0open-source kernel drivers\nhttps://www.cyberark.com/resources/threat-research-blog/colorful-vulnerabilities", "creation_timestamp": "2022-09-17T13:27:13.000000Z"}, {"uuid": "89ce4f87-269c-480f-9f1a-8eaff445f049", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-29582", "type": "published-proof-of-concept", "source": "https://t.me/hackingbra/15", "content": "CVE-2022-29582, an io_uring vulnerability\n\nA detailed and well-written article by Awarau and David Bouman about exploiting a slab use-after-free vulnerability in the io_uring subsystem.\n\nThe exploit leverages a cross-cache attack and msg_msg spraying to overwrite a tls_context object and execute a ROP chain to gain root.", "creation_timestamp": "2022-08-11T16:26:16.000000Z"}, {"uuid": "f231db4c-1659-4890-8a5e-507fe5ec85e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-29582", "type": "seen", "source": "https://t.me/cibsecurity/41336", "content": "\u203c CVE-2022-29582 \u203c\n\nIn the Linux kernel before 5.17.3, fs/io_uring.c has a use-after-free due to a race condition in io_uring timeouts. This can be triggered by a local user who has no access to any user namespace; however, the race condition perhaps can only be exploited infrequently.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-22T20:28:06.000000Z"}]}