Vigil@nce - Vigil@nce - QEMU: reuse after free via virtio_net_receive_rcu(), analyzed on 04/10/2021
December 2021 by Vigil@nce
Vigil@nce - An attacker can force the reuse of a freed memory area of QEMU, via virtio_net_receive_rcu(), in order to trigger a denial of service, and possibly to run code.
Plus d'information sur : https://vigilance.fr/vulnerability/QEMU-reuse-after-free-via-virtio-net-receive-rcu-36561