<- Back
Comments (90)
- FriedFishesI can't quite make out if this is new or not. The attack vector here seems congruent with a similar exploit from a couple months ago [1]But still might be an open threat. On the email thread Jens seems to think that this is already patched and in stable, he also points out that for this exploit to work (as written in the article) you already need escalated privileges [2] Catchy title though.[1] https://snailsploit.com/security-research/general/io-uring-z...[2] https://seclists.org/oss-sec/2026/q2/448
- rishabhaioverWhat is happening? I see multiple outages and CVEs is being reported on HN's front page. I've never seen these many security/incident related posts on HN's front page.
- pamcakeThis kind of post really shouldn't require client-side js — from third-party domain — to read...static markdown version: https://raw.githubusercontent.com/ze3tar/ze3tar.github.io/9d...
- stonegray> “and is writable with CAP_SYS_ADMIN”Am I reading this wrong or is this just a way of executing an arbitrary binary with uid=0 if you have both CAP_NET_ADMIN and CAP_SYS_ADMIN?If you can write modprobe_path, is it really news that you can find a way to execute code?
- somebudyelseLet's see... That's 4 Linux LPEs in the last 10 days?Copy Fail [1]Copy Fail 2: Electric Boogaloo [2]Dirty Frag [3]And now this...[1]: https://copy.fail[2]: https://github.com/0xdeadbeefnetwork/Copy_Fail2-Electric_Boo...[3]: https://github.com/V4bel/dirtyfrag
- kroCAP_NET/SYS_ADMIN is required for this. So this would be "not as bad" as the others.
- staticassertionio-uring is a security nightmare. Constant privescs and a powerful primitive for syscall smuggling. Worth considering disabling it outright (already the case for most containers afaik).
- shordenInteresting, I haven't tested this myself but intuitively I think that a 4 byte OOB write is plenty for a data-only attack like [PageJack](https://i.blackhat.com/BH-US-24/Presentations/US24-Qian-Page...), so I don't think hardening against the KASLR leaks discussed in OP would necessarily save you from this attack.
- dundariousHow many systems have the relevant NICs, and followed the non-automatic setup steps in https://docs.kernel.org/networking/iou-zcrx.html, and are not running within a VM/container disabling io_uring?This seems on the low impact end of the numerous historical io_uring issues.Interesting and important all the same.
- csmantleI first read this from the author's posting to oss-security. Turns out that the author did agree to revise the blog post for the "admin cap for root shell" part [^0]. [^1] would probably tell more.The title looks like clickbait to me.[^0]: https://www.openwall.com/lists/oss-security/2026/05/08/10[^1]: https://www.openwall.com/lists/oss-security/2026/05/08/14
- saghm[flagged]
- JoeDohnSo this is another CVE? Or am I misreading this one? "Copy‑fail", "DirtyFrag", now "IUrinegOnYou :)"?Joke aside, we'll see more CVEs in the coming months, and in a sense that's good: it leaves less maneuvering room for bad actors (especially those selling them to the highest bidder).
- ctothIf this many are public right now, what does that say about the dark matter of private ones? What's the typical public-private rate for this sort of thing/can someone help me calibrate my base rate expectations?
- SubiculumCodeDo most servers need this? Or can most of us 'sysctl -w kernel.io_uring_disabled=2 ' ?
- baqWhat’s our prior for p(doom) today…?
- himata4113high privilege access required (CAP/NET admin), containers / sandboxing wins once again.Can we make sandboxing the new default now? Flatpak does a good job, but we're still pretty far away for apt/yum/pacman installed packages. AppArmor was a decent step forward, but clearly not enough.
- anonundefined
- rvzAnother one.Linux is falling apart faster than it can assign these CVEs.