Executive Summary

Informations
Name CVE-2021-46973 First vendor Publication 2024-02-27
Vendor Cve Last vendor Modification 2024-08-01

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

net: qrtr: Avoid potential use after free in MHI send

It is possible that the MHI ul_callback will be invoked immediately following the queueing of the skb for transmission, leading to the callback decrementing the refcount of the associated sk and freeing the skb.

As such the dereference of skb and the increment of the sk refcount must happen before the skb is queued, to avoid the skb to be used after free and potentially the sk to drop its last refcount..

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46973

Sources (Detail)

https://git.kernel.org/stable/c/03c649dee8b1eb5600212a249542a70f47a5ab40
https://git.kernel.org/stable/c/47a017f33943278570c072bc71681809b2567b3a
https://git.kernel.org/stable/c/48ec949ac979b4b42d740f67b6177797af834f80
https://git.kernel.org/stable/c/ea474054c2cc6e1284604b21361f475c7cc8c0a0
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
Date Informations
2024-08-01 17:27:39
  • Multiple Updates
2024-02-28 17:27:37
  • Multiple Updates
2024-02-28 00:27:26
  • First insertion