Researchers have developed a novel and highly effective exploitation method for the Linux kernel use-after-free vulnerability, significantly increasing its practical threat, with the method bypassing kernel hardening and leveraging advanced primitives for information leaks and arbitrary read/write. This approach poses a major threat to modern Linux systems, requiring urgent patching.
Latest mentioned: 09-09
Earliest mentioned: 09-02