CVE-2021-46973

In the Linux kernel, the following vulnerability has been resolved: net: qrtr: Avoid potential use after free in MHI send It is possible that the MHI ul_callback will be invoked immediately following the queueing of the skb for transmission, leading to the callback decrementing the refcount of the associated sk and freeing the skb. As such the dereference of skb and the increment of the sk refcount must happen before the skb is queued, to avoid the skb to be used after free and potentially the sk to drop its last refcount..
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

14 Mar 2025, 18:44

Type Values Removed Values Added
First Time Linux linux Kernel
Linux
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/03c649dee8b1eb5600212a249542a70f47a5ab40 - () https://git.kernel.org/stable/c/03c649dee8b1eb5600212a249542a70f47a5ab40 - Patch
References () https://git.kernel.org/stable/c/47a017f33943278570c072bc71681809b2567b3a - () https://git.kernel.org/stable/c/47a017f33943278570c072bc71681809b2567b3a - Patch
References () https://git.kernel.org/stable/c/48ec949ac979b4b42d740f67b6177797af834f80 - () https://git.kernel.org/stable/c/48ec949ac979b4b42d740f67b6177797af834f80 - Patch
References () https://git.kernel.org/stable/c/ea474054c2cc6e1284604b21361f475c7cc8c0a0 - () https://git.kernel.org/stable/c/ea474054c2cc6e1284604b21361f475c7cc8c0a0 - Patch

21 Nov 2024, 06:35

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/03c649dee8b1eb5600212a249542a70f47a5ab40 - () https://git.kernel.org/stable/c/03c649dee8b1eb5600212a249542a70f47a5ab40 -
References () https://git.kernel.org/stable/c/47a017f33943278570c072bc71681809b2567b3a - () https://git.kernel.org/stable/c/47a017f33943278570c072bc71681809b2567b3a -
References () https://git.kernel.org/stable/c/48ec949ac979b4b42d740f67b6177797af834f80 - () https://git.kernel.org/stable/c/48ec949ac979b4b42d740f67b6177797af834f80 -
References () https://git.kernel.org/stable/c/ea474054c2cc6e1284604b21361f475c7cc8c0a0 - () https://git.kernel.org/stable/c/ea474054c2cc6e1284604b21361f475c7cc8c0a0 -

01 Aug 2024, 13:42

Type Values Removed Values Added
CWE CWE-416
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.4

28 Feb 2024, 14:06

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: qrtr: Evite el potencial use after free en el envío MHI. Es posible que MHI ul_callback se invoque inmediatamente después de la puesta en cola del skb para la transmisión, lo que provocará que la devolución de llamada disminuya el recuento del sk asociado y liberación del skb. Como tal, la desreferencia de skb y el incremento del refcount de sk deben ocurrir antes de que el skb se ponga en cola, para evitar que el skb haga use after free y potencialmente que el sk elimine su último refcount.

27 Feb 2024, 19:04

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-27 19:04

Updated : 2025-03-14 18:44


NVD link : CVE-2021-46973

Mitre link : CVE-2021-46973

CVE.ORG link : CVE-2021-46973


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free