In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
| linux | | https://git.kernel.org/linus/876f8ab52363f649bcc74072157dfd7adfbabc0d | https://git.kernel.org/linus/451d8123f89791bb628277c0bdb4cae34a3563e6 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
IntheLinux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
| linux | | https://git.kernel.org/linus/876f8ab52363f649bcc74072157dfd7adfbabc0d | https://git.kernel.org/linus/451d8123f89791bb628277c0bdb4cae34a3563e6 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
| linux | | https://git.kernel.org/linus/876f8ab52363f649bcc74072157dfd7adfbabc0d | https://git.kernel.org/linus/451d8123f89791bb628277c0bdb4cae34a3563e6 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
| linux | | https://git.kernel.org/linus/876f8ab52363f649bcc74072157dfd7adfbabc0d | https://git.kernel.org/linus/451d8123f89791bb628277c0bdb4cae34a3563e6 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
| linux | | https://git.kernel.org/linus/876f8ab52363f649bcc74072157dfd7adfbabc0d | https://git.kernel.org/linus/451d8123f89791bb628277c0bdb4cae34a3563e6 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
| linux | | https://git.kernel.org/linus/876f8ab52363f649bcc74072157dfd7adfbabc0d | https://git.kernel.org/linus/451d8123f89791bb628277c0bdb4cae34a3563e6 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
| linux | | https://git.kernel.org/linus/876f8ab52363f649bcc74072157dfd7adfbabc0d | https://git.kernel.org/linus/451d8123f89791bb628277c0bdb4cae34a3563e6 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
| linux | | https://git.kernel.org/linus/876f8ab52363f649bcc74072157dfd7adfbabc0d | https://git.kernel.org/linus/451d8123f89791bb628277c0bdb4cae34a3563e6 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
| linux | | https://git.kernel.org/linus/876f8ab52363f649bcc74072157dfd7adfbabc0d | https://git.kernel.org/linus/451d8123f89791bb628277c0bdb4cae34a3563e6 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
| linux | | https://git.kernel.org/linus/876f8ab52363f649bcc74072157dfd7adfbabc0d | https://git.kernel.org/linus/451d8123f89791bb628277c0bdb4cae34a3563e6 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
| linux | | https://git.kernel.org/linus/876f8ab52363f649bcc74072157dfd7adfbabc0d | https://git.kernel.org/linus/451d8123f89791bb628277c0bdb4cae34a3563e6 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
| linux | | https://git.kernel.org/linus/876f8ab52363f649bcc74072157dfd7adfbabc0d | https://git.kernel.org/linus/451d8123f89791bb628277c0bdb4cae34a3563e6 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
| linux | | https://git.kernel.org/linus/876f8ab52363f649bcc74072157dfd7adfbabc0d | https://git.kernel.org/linus/451d8123f89791bb628277c0bdb4cae34a3563e6 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
| linux | | https://git.kernel.org/linus/876f8ab52363f649bcc74072157dfd7adfbabc0d | https://git.kernel.org/linus/451d8123f89791bb628277c0bdb4cae34a3563e6 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
| linux | | https://git.kernel.org/linus/876f8ab52363f649bcc74072157dfd7adfbabc0d | https://git.kernel.org/linus/451d8123f89791bb628277c0bdb4cae34a3563e6 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
| linux | | https://git.kernel.org/linus/876f8ab52363f649bcc74072157dfd7adfbabc0d | https://git.kernel.org/linus/451d8123f89791bb628277c0bdb4cae34a3563e6 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
| linux | | https://git.kernel.org/linus/876f8ab52363f649bcc74072157dfd7adfbabc0d | https://git.kernel.org/linus/451d8123f89791bb628277c0bdb4cae34a3563e6 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
| linux | | https://git.kernel.org/linus/876f8ab52363f649bcc74072157dfd7adfbabc0d | https://git.kernel.org/linus/451d8123f89791bb628277c0bdb4cae34a3563e6 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
| linux | | https://git.kernel.org/linus/876f8ab52363f649bcc74072157dfd7adfbabc0d | https://git.kernel.org/linus/451d8123f89791bb628277c0bdb4cae34a3563e6 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
| linux | | https://git.kernel.org/linus/876f8ab52363f649bcc74072157dfd7adfbabc0d | https://git.kernel.org/linus/451d8123f89791bb628277c0bdb4cae34a3563e6 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
| linux | | https://git.kernel.org/linus/876f8ab52363f649bcc74072157dfd7adfbabc0d | https://git.kernel.org/linus/451d8123f89791bb628277c0bdb4cae34a3563e6 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
| linux | | https://git.kernel.org/linus/876f8ab52363f649bcc74072157dfd7adfbabc0d | https://git.kernel.org/linus/451d8123f89791bb628277c0bdb4cae34a3563e6 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct()function can fail. In thatsituation,it frees theskb and returnsNULL. Meanwhile on the success path, itreturns theoriginal skb. So it sstraight forward to fix bug by using the returnedvalue.
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
| linux | | https://git.kernel.org/linus/876f8ab52363f649bcc74072157dfd7adfbabc0d | https://git.kernel.org/linus/451d8123f89791bb628277c0bdb4cae34a3563e6 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
IntheLinuxkernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation,it freestheskb andreturns NULL. Meanwhile onthe success path, it returns theoriginalskb. So it s straight forward tofix bug by using the returnedvalue.
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
| linux | | https://git.kernel.org/linus/876f8ab52363f649bcc74072157dfd7adfbabc0d | https://git.kernel.org/linus/451d8123f89791bb628277c0bdb4cae34a3563e6 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
| linux | | https://git.kernel.org/linus/876f8ab52363f649bcc74072157dfd7adfbabc0d | https://git.kernel.org/linus/451d8123f89791bb628277c0bdb4cae34a3563e6 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
| linux | | https://git.kernel.org/linus/876f8ab52363f649bcc74072157dfd7adfbabc0d | https://git.kernel.org/linus/451d8123f89791bb628277c0bdb4cae34a3563e6 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
| linux | | https://git.kernel.org/linus/876f8ab52363f649bcc74072157dfd7adfbabc0d | https://git.kernel.org/linus/451d8123f89791bb628277c0bdb4cae34a3563e6 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
| linux | | https://git.kernel.org/linus/876f8ab52363f649bcc74072157dfd7adfbabc0d | https://git.kernel.org/linus/451d8123f89791bb628277c0bdb4cae34a3563e6 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
| linux | | https://git.kernel.org/linus/876f8ab52363f649bcc74072157dfd7adfbabc0d | https://git.kernel.org/linus/451d8123f89791bb628277c0bdb4cae34a3563e6 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
| linux | | https://git.kernel.org/linus/876f8ab52363f649bcc74072157dfd7adfbabc0d | https://git.kernel.org/linus/451d8123f89791bb628277c0bdb4cae34a3563e6 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
| linux | | https://git.kernel.org/linus/876f8ab52363f649bcc74072157dfd7adfbabc0d | https://git.kernel.org/linus/451d8123f89791bb628277c0bdb4cae34a3563e6 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
| linux | | https://git.kernel.org/linus/876f8ab52363f649bcc74072157dfd7adfbabc0d | https://git.kernel.org/linus/451d8123f89791bb628277c0bdb4cae34a3563e6 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
| linux | | https://git.kernel.org/linus/876f8ab52363f649bcc74072157dfd7adfbabc0d | https://git.kernel.org/linus/451d8123f89791bb628277c0bdb4cae34a3563e6 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
| linux | | https://git.kernel.org/linus/876f8ab52363f649bcc74072157dfd7adfbabc0d | https://git.kernel.org/linus/451d8123f89791bb628277c0bdb4cae34a3563e6 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
| linux | | https://git.kernel.org/linus/876f8ab52363f649bcc74072157dfd7adfbabc0d | https://git.kernel.org/linus/451d8123f89791bb628277c0bdb4cae34a3563e6 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
| linux | | https://git.kernel.org/linus/876f8ab52363f649bcc74072157dfd7adfbabc0d | https://git.kernel.org/linus/451d8123f89791bb628277c0bdb4cae34a3563e6 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
| linux | | https://git.kernel.org/linus/876f8ab52363f649bcc74072157dfd7adfbabc0d | https://git.kernel.org/linus/451d8123f89791bb628277c0bdb4cae34a3563e6 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
| linux | | https://git.kernel.org/linus/876f8ab52363f649bcc74072157dfd7adfbabc0d | https://git.kernel.org/linus/451d8123f89791bb628277c0bdb4cae34a3563e6 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
| linux | | https://git.kernel.org/linus/876f8ab52363f649bcc74072157dfd7adfbabc0d | https://git.kernel.org/linus/451d8123f89791bb628277c0bdb4cae34a3563e6 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
| linux | | https://git.kernel.org/linus/876f8ab52363f649bcc74072157dfd7adfbabc0d | https://git.kernel.org/linus/451d8123f89791bb628277c0bdb4cae34a3563e6 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
| linux | | https://git.kernel.org/linus/876f8ab52363f649bcc74072157dfd7adfbabc0d | https://git.kernel.org/linus/451d8123f89791bb628277c0bdb4cae34a3563e6 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
| linux | | https://git.kernel.org/linus/876f8ab52363f649bcc74072157dfd7adfbabc0d | https://git.kernel.org/linus/451d8123f89791bb628277c0bdb4cae34a3563e6 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
| linux | | https://git.kernel.org/linus/876f8ab52363f649bcc74072157dfd7adfbabc0d | https://git.kernel.org/linus/451d8123f89791bb628277c0bdb4cae34a3563e6 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
| linux | | https://git.kernel.org/linus/876f8ab52363f649bcc74072157dfd7adfbabc0d | https://git.kernel.org/linus/451d8123f89791bb628277c0bdb4cae34a3563e6 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
| linux | | https://git.kernel.org/linus/876f8ab52363f649bcc74072157dfd7adfbabc0d | https://git.kernel.org/linus/451d8123f89791bb628277c0bdb4cae34a3563e6 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
| linux | | https://git.kernel.org/linus/876f8ab52363f649bcc74072157dfd7adfbabc0d | https://git.kernel.org/linus/451d8123f89791bb628277c0bdb4cae34a3563e6 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
| linux | | https://git.kernel.org/linus/876f8ab52363f649bcc74072157dfd7adfbabc0d | https://git.kernel.org/linus/451d8123f89791bb628277c0bdb4cae34a3563e6 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
| linux | | https://git.kernel.org/linus/876f8ab52363f649bcc74072157dfd7adfbabc0d | https://git.kernel.org/linus/451d8123f89791bb628277c0bdb4cae34a3563e6 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
| linux | | https://git.kernel.org/linus/876f8ab52363f649bcc74072157dfd7adfbabc0d | https://git.kernel.org/linus/451d8123f89791bb628277c0bdb4cae34a3563e6 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
| linux | | https://git.kernel.org/linus/876f8ab52363f649bcc74072157dfd7adfbabc0d | https://git.kernel.org/linus/451d8123f89791bb628277c0bdb4cae34a3563e6 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
| linux | | https://git.kernel.org/linus/876f8ab52363f649bcc74072157dfd7adfbabc0d | https://git.kernel.org/linus/451d8123f89791bb628277c0bdb4cae34a3563e6 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
| linux | | https://git.kernel.org/linus/876f8ab52363f649bcc74072157dfd7adfbabc0d | https://git.kernel.org/linus/451d8123f89791bb628277c0bdb4cae34a3563e6 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In theLinux kernel,thefollowing vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()Theprp_fill_rct()function can fail. In that situation,it frees theskb andreturns NULL. Meanwhile on the success path,it returns theoriginal skb. So it sstraightforward to fix bug by using the returnedvalue.
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
| linux | | https://git.kernel.org/linus/876f8ab52363f649bcc74072157dfd7adfbabc0d | https://git.kernel.org/linus/451d8123f89791bb628277c0bdb4cae34a3563e6 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
IntheLinuxkernel,thefollowingvulnerabilityhasbeen resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function canfail. In thatsituation, it freestheskb and returnsNULL. Meanwhile onthe success path, it returns theoriginal skb. So it s straight forward tofix bugby usingthe returnedvalue.
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
| linux | | https://git.kernel.org/linus/876f8ab52363f649bcc74072157dfd7adfbabc0d | https://git.kernel.org/linus/451d8123f89791bb628277c0bdb4cae34a3563e6 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
| linux | | https://git.kernel.org/linus/876f8ab52363f649bcc74072157dfd7adfbabc0d | https://git.kernel.org/linus/451d8123f89791bb628277c0bdb4cae34a3563e6 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
| linux | | https://git.kernel.org/linus/876f8ab52363f649bcc74072157dfd7adfbabc0d | https://git.kernel.org/linus/451d8123f89791bb628277c0bdb4cae34a3563e6 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
| linux | | https://git.kernel.org/linus/876f8ab52363f649bcc74072157dfd7adfbabc0d | https://git.kernel.org/linus/451d8123f89791bb628277c0bdb4cae34a3563e6 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
| linux | | https://git.kernel.org/linus/876f8ab52363f649bcc74072157dfd7adfbabc0d | https://git.kernel.org/linus/451d8123f89791bb628277c0bdb4cae34a3563e6 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
| linux | | https://git.kernel.org/linus/876f8ab52363f649bcc74072157dfd7adfbabc0d | https://git.kernel.org/linus/451d8123f89791bb628277c0bdb4cae34a3563e6 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
| linux | | https://git.kernel.org/linus/876f8ab52363f649bcc74072157dfd7adfbabc0d | https://git.kernel.org/linus/451d8123f89791bb628277c0bdb4cae34a3563e6 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
In theLinux kernel, the following vulnerability has been resolved:hsr: Prevent useafter free in prp_create_tagged_frame()The prp_fill_rct() function canfail. In that situation, itfrees theskb and returnsNULL. Meanwhile on thesuccesspath, it returns theoriginalskb. So it s straight forward to fix bug byusing the returnedvalue.
In the Linux kernel, the following vulnerability has been resolved:hsr: Prevent use after free in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it frees theskb and returns NULL. Meanwhile on the success path, it returns theoriginal skb. So it s straight forward to fix bug by using the returnedvalue.
| linux | | https://git.kernel.org/linus/876f8ab52363f649bcc74072157dfd7adfbabc0d | https://git.kernel.org/linus/451d8123f89791bb628277c0bdb4cae34a3563e6 | ubuntu |
</details>
二、漏洞分析结构反馈
影响性分析说明:
Inthe Linuxkernel, the following vulnerability has been resolved:hsr: Prevent use afterfree in prp_create_tagged_frame()The prp_fill_rct() function can fail. In that situation, it freestheskb and returns NULL. Meanwhile on the success path,it returns theoriginal skb. So its straight forward to fix bug by usingthe returnedvalue.