In the Linux kernel, the following vulnerability has been resolved: ipv6: prevent possible UAF in ip6_xmit() If skb_expand_head() returns NULL, skb has been freed and the associated dst/idev could also have been freed. We must use rcu_read_lock() to prevent a possible UAF.
https://git.kernel.org/stable/c/fc88d6c1f2895a5775795d82ec581afdff7661d1
https://git.kernel.org/stable/c/975f764e96f71616b530e300c1bb2ac0ce0c2596
https://git.kernel.org/stable/c/38a21c026ed2cc7232414cb166efc1923f34af17
https://git.kernel.org/stable/c/2d5ff7e339d04622d8282661df36151906d0e1c7
https://git.kernel.org/stable/c/124b428fe28064c809e4237b0b38e97200a8a4a8