In the Linux kernel, the following vulnerability has been resolved: ndisc: extend RCU protection in ndisc_send_skb() ndisc_send_skb() can be called without RTNL or RCU held. Acquire rcu_read_lock() earlier, so that we can use dev_net_rcu() and avoid a potential UAF.
https://git.kernel.org/stable/c/ed6ae1f325d3c43966ec1b62ac1459e2b8e45640
https://git.kernel.org/stable/c/ae38982f521621c216fc2f5182cd091f4734641d
https://git.kernel.org/stable/c/a9319d800b5701e7f5e3fa71a5b7c4831fc20d6d
https://git.kernel.org/stable/c/789230e5a8c1097301afc802e242c79bc8835c67
https://git.kernel.org/stable/c/04e05112f10354ffc3bb6cc796d553bab161594c