Tags: radare2 kernel pwn reverse-engineering 

Rating: 5.0

The writeup is available here: https://xarkes.com/b/hacklu-2019-babykernel-wu.html
TL;DR:
1. Compute real_cred offset in task_struct
2. Get current_task pointer
3. Get current_task->real_cred pointer
4. Overwrite current_task->real_cred->fsuid with 0
5. Read /flag

Original writeup (https://xarkes.com/b/hacklu-2019-babykernel-wu.html).