In the Linux kernel, the following vulnerability has been resolved:
ipv6: prevent possible UAF in ip6_xmit()
If skb_expand_head() returns NULL, skb has been freed
and the associated dst/idev could also have been freed.
We must use rcu_read_lock() to prevent a possible UAF.
git.kernel.org/stable/c/124b428fe28064c809e4237b0b38e97200a8a4a8
git.kernel.org/stable/c/2d5ff7e339d04622d8282661df36151906d0e1c7
git.kernel.org/stable/c/38a21c026ed2cc7232414cb166efc1923f34af17
git.kernel.org/stable/c/975f764e96f71616b530e300c1bb2ac0ce0c2596
git.kernel.org/stable/c/fc88d6c1f2895a5775795d82ec581afdff7661d1