Use-after-free vulnerability in Linux kernel due to a race condition in packet_set_ring leadsID: oval:org.secpod.oval:def:38253 | Date: (C)2016-12-08 (M)2023-02-20 |
Class: VULNERABILITY | Family: unix |
The host is installed with Linux kernel on RHEL 7 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to properly handle a race condition in packet_set_ring leads. Successful exploitation could allow attackers to elevate their privileges on the system.
Platform: |
Red Hat Enterprise Linux 7 |