CVE-2021-46973

In the Linux kernel, the following vulnerability has been resolved: net: qrtr: Avoid potential use after free in MHI send It is possible that the MHI ul_callback will be invoked immediately following the queueing of the skb for transmission, leading to the callback decrementing the refcount of the associated sk and freeing the skb. As such the dereference of skb and the increment of the sk refcount must happen before the skb is queued, to avoid the skb to be used after free and potentially the sk to drop its last refcount..
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

14 Mar 2025, 18:44

Type Values Removed Values Added
First Time Linux linux Kernel
Linux
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/03c649dee8b1eb5600212a249542a70f47a5ab40 - () https://git.kernel.org/stable/c/03c649dee8b1eb5600212a249542a70f47a5ab40 - Patch
References () https://git.kernel.org/stable/c/47a017f33943278570c072bc71681809b2567b3a - () https://git.kernel.org/stable/c/47a017f33943278570c072bc71681809b2567b3a - Patch
References () https://git.kernel.org/stable/c/48ec949ac979b4b42d740f67b6177797af834f80 - () https://git.kernel.org/stable/c/48ec949ac979b4b42d740f67b6177797af834f80 - Patch
References () https://git.kernel.org/stable/c/ea474054c2cc6e1284604b21361f475c7cc8c0a0 - () https://git.kernel.org/stable/c/ea474054c2cc6e1284604b21361f475c7cc8c0a0 - Patch

Information

Published : 2024-02-27 19:04

Updated : 2025-03-14 18:44


NVD link : CVE-2021-46973

Mitre link : CVE-2021-46973

CVE.ORG link : CVE-2021-46973


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free