CVE-2015-5122: Exploitation Using COOP

In this post we discuss advanced code reuse technique “COOP,” which uses an old vulnerability to conform to the theoretical boundaries of CFI.
Analysis and Exploitation of a Linux Kernel Vulnerability

Learn how the Linux kernel vulnerability is caused by a reference leak in the keyrings facility, primarily for drivers to cache security and other data. CVE-2016-0728.