A local attacker can exploit multiple vulnerabilities in the Linux Kernel to bypass security measures.
| Vendor | Product | Versions |
|---|---|---|
| linux | linux kernel | — |
Updated description with new technical details, set severity to HIGH, and marked the vulnerability as actively exploited with an exploit available.
Initial creation