-
CVE-2026-43481
- EPSS 0.02%
- Veröffentlicht 13.05.2026 15:08:29
- Zuletzt bearbeitet 13.05.2026 16:16:51
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
net-shapers: don't free reply skb after genlmsg_reply()
In the Linux kernel, the following vulnerability has been resolved: net-shapers: don't free reply skb after genlmsg_reply() genlmsg_reply() hands the reply skb to netlink, and netlink_unicast() consumes it on all return paths, whether the skb is queued successfully or freed on an error path. net_shaper_nl_get_doit() and net_shaper_nl_cap_get_doit() currently jump to free_msg after genlmsg_reply() fails and call nlmsg_free(msg), which can hit the same skb twice. Return the genlmsg_reply() error directly and keep free_msg only for pre-reply failures.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version
4b623f9f0f59652ea71fcb27d60b4c3b65126dbb
Version <
8738dcc844fff7d0157ee775230e95df3b1884d7
Status
affected
Version
4b623f9f0f59652ea71fcb27d60b4c3b65126dbb
Version <
83f7b54242d0abbfce35a55c01322f50962ed3ee
Status
affected
Version
4b623f9f0f59652ea71fcb27d60b4c3b65126dbb
Version <
57885276cc16a2e2b76282c808a4e84cbecb3aae
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
6.13
Status
affected
Version
0
Version <
6.13
Status
unaffected
Version <=
6.18.*
Version
6.18.19
Status
unaffected
Version <=
6.19.*
Version
6.19.9
Status
unaffected
Version <=
*
Version
7.0
Status
unaffected
VulnDex Vulnerability Enrichment
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.02% | 0.041 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|