Reviving Discarded Vulnerabilities: Exploiting Previously Unexploitable Linux Kernel Bugs Through Control Metadata FieldsPublished in ACM CCS, 2025Share on Twitter Facebook LinkedIn Previous Next