Vigil@nce - Vigil@nce - Xen | Noyau Linux: reuse after free via eXpress Data Path, analyzed on 05/07/2022
September 2022 by Vigil@nce
Vigil@nce - An attacker, in a guest system, can force the reuse of a freed memory area of Xen | Noyau Linux, via eXpress Data Path, in order to trigger a denial of service, and possibly to run code on the host system.
Plus d'information sur : https://vigilance.fr/vulnerability/Xen-Noyau-Linux-reuse-after-free-via-eXpress-Data-Path-38731