In f_hidg_read and hidg_disable of f_hid.c, there is a possible use-after-free due to improper locking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
This Cyber News was published on www.tenable.com. Publication date: Wed, 20 Nov 2024 09:11:11 +0000