This repository contains exploit code for CVE-2022-29582, a Local Privilege Escalation in `io_uring` (of the Linux kernel).
Default configurations are affected and no special privileges should be needed.
You can find the writeup at [https://ruia-ruia.github.io/2022/08/05/CVE-2022-29582-io-uring/](https://ruia-ruia.github.io/2022/08/05/CVE-2022-29582-io-uring/)
should result in a shiny new executable - or just use the pre-commited one :)
First, check the writeup for the (micro)arch specs. Then run the given kernel: vmlinuz-5.10.90.
The exploit (particularly now the ROP chain) should work fine with the kCTF setup.