CVE-2021-46973

In the Linux kernel, the following vulnerability has been resolved: net: qrtr: Avoid potential use after free in MHI send It is possible that the MHI ul_callback will be invoked immediately following the queueing of the skb for transmission, leading to the callback decrementing the refcount of the associated sk and freeing the skb. As such the dereference of skb and the increment of the sk refcount must happen before the skb is queued, to avoid the skb to be used after free and potentially the sk to drop its last refcount..
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

14 Mar 2025, 18:44

Type Values Removed Values Added
First Time Linux
Linux linux Kernel
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/03c649dee8b1eb5600212a249542a70f47a5ab40 - () https://git.kernel.org/stable/c/03c649dee8b1eb5600212a249542a70f47a5ab40 - Patch
References () https://git.kernel.org/stable/c/47a017f33943278570c072bc71681809b2567b3a - () https://git.kernel.org/stable/c/47a017f33943278570c072bc71681809b2567b3a - Patch
References () https://git.kernel.org/stable/c/48ec949ac979b4b42d740f67b6177797af834f80 - () https://git.kernel.org/stable/c/48ec949ac979b4b42d740f67b6177797af834f80 - Patch
References () https://git.kernel.org/stable/c/ea474054c2cc6e1284604b21361f475c7cc8c0a0 - () https://git.kernel.org/stable/c/ea474054c2cc6e1284604b21361f475c7cc8c0a0 - Patch

21 Nov 2024, 06:35

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/03c649dee8b1eb5600212a249542a70f47a5ab40 - () https://git.kernel.org/stable/c/03c649dee8b1eb5600212a249542a70f47a5ab40 -
References () https://git.kernel.org/stable/c/47a017f33943278570c072bc71681809b2567b3a - () https://git.kernel.org/stable/c/47a017f33943278570c072bc71681809b2567b3a -
References () https://git.kernel.org/stable/c/48ec949ac979b4b42d740f67b6177797af834f80 - () https://git.kernel.org/stable/c/48ec949ac979b4b42d740f67b6177797af834f80 -
References () https://git.kernel.org/stable/c/ea474054c2cc6e1284604b21361f475c7cc8c0a0 - () https://git.kernel.org/stable/c/ea474054c2cc6e1284604b21361f475c7cc8c0a0 -

01 Aug 2024, 13:42

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.4
CWE CWE-416

27 Feb 2024, 19:04

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-27 19:04

Updated : 2025-03-14 18:44


NVD link : CVE-2021-46973

Mitre link : CVE-2021-46973

CVE.ORG link : CVE-2021-46973


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free