Vigil@nce - Vigil@nce - Linux kernel: double free via packet_set_ring(), analyzed on 11/02/2022
April 2022 by Vigil@nce
Vigil@nce - An attacker can force a double memory free of the Linux kernel, via packet_set_ring(), in order to trigger a denial of service, and possibly to run code.
Plus d'information sur : https://vigilance.fr/vulnerability/Linux-kernel-double-free-via-packet-set-ring-37524