In the Linux kernel, the following vulnerability has been resolved: can: j1939: fix Use-after-Free, hold skb ref while in use This patch fixes a Use-after-Free found by the syzbot. The problem is that a skb is taken from the per-session skb queue, without incrementing the ref count. This leads to a Use-after-Free if the skb is taken concurrently from the session queue due to a CTS.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 12 | all | linux | < 5.10.46-1 | linux_5.10.46-1_all.deb |
Debian | 11 | all | linux | < 5.10.46-1 | linux_5.10.46-1_all.deb |
Debian | 10 | all | linux | < 4.19.249-2 | linux_4.19.249-2_all.deb |
Debian | 999 | all | linux | < 5.10.46-1 | linux_5.10.46-1_all.deb |
Debian | 13 | all | linux | < 5.10.46-1 | linux_5.10.46-1_all.deb |