In the Linux kernel, the following vulnerability has been resolved: net:
qrtr: Avoid potential use after free in MHI send It is possible that the
MHI ul_callback will be invoked immediately following the queueing of the
skb for transmission, leading to the callback decrementing the refcount of
the associated sk and freeing the skb. As such the dereference of skb and
the increment of the sk refcount must happen before the skb is queued, to
avoid the skb to be used after free and potentially the sk to drop its last
refcount…
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 23.10 | noarch | linux | < any | UNKNOWN |
ubuntu | 24.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 14.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 16.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 20.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 22.04 | noarch | linux-aws | < any | UNKNOWN |
git.kernel.org/stable/c/03c649dee8b1eb5600212a249542a70f47a5ab40
git.kernel.org/stable/c/47a017f33943278570c072bc71681809b2567b3a
git.kernel.org/stable/c/48ec949ac979b4b42d740f67b6177797af834f80
git.kernel.org/stable/c/ea474054c2cc6e1284604b21361f475c7cc8c0a0
launchpad.net/bugs/cve/CVE-2021-46973
nvd.nist.gov/vuln/detail/CVE-2021-46973
security-tracker.debian.org/tracker/CVE-2021-46973
www.cve.org/CVERecord?id=CVE-2021-46973