Tags: pwn kernel 

Rating: 2.0

1. Read `current_task` ptr address based on provided `System.map`
2. Get `cred* cred` pointer
3. Overwrite `cred->fsuid` and `cred->fsguid`
4. Read `/flag`

Exploit here: https://github.com/justcatthefish/ctf/blob/master/2019-10-23-hacklu-ctf/baby_kernel2_pwn/solution.py

Written by disconnect3d

Original writeup (https://github.com/justcatthefish/ctf/blob/master/2019-10-23-hacklu-ctf/baby_kernel2_pwn/solution.py).