{"uuid": "38411d3a-8fd6-46df-a9d0-ed588ba18dd7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-20226", "type": "published-proof-of-concept", "source": "https://t.me/tech_b0lt_Genona/2591", "content": "\u041d\u0438\u0447\u0435\u0433\u043e \u043d\u0435 \u043f\u043e\u043d\u044f\u0442\u043d\u043e, \u043d\u043e \u043e\u0447\u0435\u043d\u044c \u0438\u043d\u0442\u0435\u0440\u0435\u0441\u043d\u043e.\n\n&gt; If that name sounds familiar at all, Ryota also competed in the most recent Pwn2Own and won $30,000 demonstrating a different privilege escalation bug on Ubuntu.\n\nCVE-2021-20226: A REFERENCE-COUNTING BUG IN THE LINUX KERNEL IO_URING SUBSYSTEM\nhttps://www.zerodayinitiative.com/blog/2021/4/22/cve-2021-20226-a-reference-counting-bug-in-the-linux-kernel-iouring-subsystem", "creation_timestamp": "2021-04-22T21:06:12.000000Z"}