Home Tools Exploits & CVE's Linux videobuf2 Use-After-Free ToolsExploits & CVE's Linux videobuf2 Use-After-Free By The Cyber Post - January 9, 2023 331 0 FacebookTwitterPinterestLinkedinReddIt Authored by Google Security Research, Seth Jenkins An unsafe use of follow_pfn in get_vaddr_frames in videobuf2 on Linux leads to use-after-free issues or writes to ro-pages. RELATED ARTICLESMORE FROM AUTHOR Exploits & CVE's osCommerce 4 Cross Site Scripting Exploits & CVE's undefinedExploiting The NT Kernel In 24H2undefined Exploits & CVE's Windows NtQueryInformationThread Double-Fetch / Arbitrary Write