In the Linux kernel, the following vulnerability has been resolved:
netrom: fix double-free in nr_route_frame()
In nr_route_frame(), old_skb is immediately freed without checking if
nr_neigh->ax25 pointer is NULL. Therefore, if nr_neigh->ax25 is NULL,
the caller function will free old_skb again, causing a double-free bug.
Therefore, to prevent this, we need to modify it to check whether
nr_neigh->ax25 is NULL before freeing old_skb.
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2026-02-04 17:16
Updated : 2026-03-18 20:09
NVD link : CVE-2026-23098
Mitre link : CVE-2026-23098
CVE.ORG link : CVE-2026-23098
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-415
Double Free
