<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Root on The Coders Blog</title><link>https://thecodersblog.com/tag/root/</link><description>Recent content in Root on The Coders Blog</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Fri, 08 May 2026 20:57:46 +0000</lastBuildDate><atom:link href="https://thecodersblog.com/tag/root/index.xml" rel="self" type="application/rss+xml"/><item><title>io_uring Vulnerability: Gaining Root Access via ZCRX Freelists</title><link>https://thecodersblog.com/io-uring-zcrx-freelists-and-root-privilege-escalation-2026/</link><pubDate>Fri, 08 May 2026 20:57:46 +0000</pubDate><guid>https://thecodersblog.com/io-uring-zcrx-freelists-and-root-privilege-escalation-2026/</guid><description>&lt;p&gt;The Linux kernel, a bastion of stability and performance, continuously evolves. Among its most impactful recent additions is &lt;code&gt;io_uring&lt;/code&gt;, a high-performance asynchronous I/O interface. While lauded for its speed and efficiency, &lt;code&gt;io_uring&lt;/code&gt; has also become a recurring focal point for kernel security researchers, earning a reputation as a &amp;ldquo;security headache&amp;rdquo; with a disproportionately high number of exploits targeting it. The latest revelation, a critical vulnerability in the Zerocopy Receive (ZCRX) subsystem, underscores this trend, offering a direct path to root privilege escalation by corrupting the ZCRX freelist. This post dissects the technical underpinnings of this exploit, its far-reaching implications, and why it&amp;rsquo;s yet another stark reminder of the inherent trade-offs between raw performance and kernel security.&lt;/p&gt;</description></item></channel></rss>