{"uuid": "52c66693-2261-4708-be51-2e9e8a8a3e08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-2602", "type": "seen", "source": "https://t.me/linkersec/201", "content": "DirtyCred Remastered: how to turn an UAF into Privilege Escalation\n\nLukeGix and Alessandro Groppo published two articles about exploiting CVE-2022-2602, another use-after-free in the io_uring subsystem.\n\nThey used inode locking for pausing a kernel thread during UAF exploitation. To escalate privileges, the researchers employed the DirtyCred file exploitation technique.", "creation_timestamp": "2022-12-24T13:43:32.000000Z"}