The related links of this vulnerability information have been published.
https://twitter.com/bl4sty/status/1355473814117867528
But I’m not going to study its internal principle,just want to exploit this vulnerability accroding to the article which is published on twitter.
Learning makes me happy :)
I will run the exploit code on different kinds of linux to reproduce this vulnerability.