Vigil@nce - Vigil@nce - Linux kernel: reuse after free via tee_shm_get_from_id(), analyzed on 23/12/2021
February 2022 by Vigil@nce
Vigil@nce - An attacker can force the reuse of a freed memory area of the Linux kernel, via tee_shm_get_from_id(), in order to trigger a denial of service, and possibly to run code.
Plus d'information sur : https://vigilance.fr/vulnerability/Linux-kernel-reuse-after-free-via-tee-shm-get-from-id-37127