Vigil@nce - Vigil@nce - Linux kernel: out-of-bounds memory reading via get_ctl_id_hash(), analyzed on 14/09/2022
September 2022 by Vigil@nce
Vigil@nce - An attacker can force a read at an invalid memory address of the Linux kernel, via get_ctl_id_hash(), in order to trigger a denial of service, or to obtain sensitive information.
Plus d'information sur : https://vigilance.fr/vulnerability/Linux-kernel-out-of-bounds-memory-reading-via-get-ctl-id-hash-39276