In the Linux kernel, the following vulnerability has been resolved:
net: qrtr: Avoid potential use after free in MHI send
It is possible that the MHI ul_callback will be invoked immediately
following the queueing of the skb for transmission, leading to the
callback decrementing the refcount of the associated sk and freeing the
skb.
As such the dereference of skb and the increment of the sk refcount must
happen before the skb is queued, to avoid the skb to be used after free
and potentially the sk to drop its last refcount..
Metrics
Affected Vendors & Products
References
History
Mon, 04 Nov 2024 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Linux
Linux linux Kernel |
|
CPEs | cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* | |
Vendors & Products |
Linux
Linux linux Kernel |
|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: Linux
Published: 2024-02-27T18:47:07.880Z
Updated: 2024-11-04T11:56:56.833Z
Reserved: 2024-02-27T18:42:55.944Z
Link: CVE-2021-46973
Vulnrichment
Updated: 2024-08-04T05:17:42.894Z
NVD
Status : Awaiting Analysis
Published: 2024-02-27T19:04:07.457
Modified: 2024-08-01T13:42:29.060
Link: CVE-2021-46973
Redhat