Use-after-free vulnerability in ping socket implementation in kernelID: oval:org.secpod.oval:def:25172 | Date: (C)2015-06-23 (M)2024-02-19 |
Class: VULNERABILITY | Family: unix |
The host is installed with kernel on Red Hat Enterprise Linux 6 or 7 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to properly handle rename operations. Successful exploitation could allow attackers to escalate privileges on the affected system.
Platform: |
Red Hat Enterprise Linux 6 |
Red Hat Enterprise Linux 7 |