Use-after-free vulnerability in Linux kernel due to a race condition in packet_set_ring leads
|ID: oval:org.secpod.oval:def:38254||Date: (C)2016-12-08 (M)2017-11-15|
|Class: VULNERABILITY||Family: unix|
The host is installed with kernel on Centos 7 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to properly handle a race condition in packet_set_ring leads. Successful exploitation could allow attackers to elevate their privileges on the system.