Логотип exploitDog
bind:CVE-2026-22997
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2026-22997

Количество 2

Количество 2

debian логотип

CVE-2026-22997

[net: can: j1939: j1939_xtp_rx_rts_session_active(): deactivate session upon receiving the second rts]

EPSS: Низкий
github логотип

GHSA-86mf-f3rq-8369

15 дней назад

In the Linux kernel, the following vulnerability has been resolved: net: can: j1939: j1939_xtp_rx_rts_session_active(): deactivate session upon receiving the second rts Since j1939_session_deactivate_activate_next() in j1939_tp_rxtimer() is called only when the timer is enabled, we need to call j1939_session_deactivate_activate_next() if we cancelled the timer. Otherwise, refcount for j1939_session leaks, which will later appear as | unregister_netdevice: waiting for vcan0 to become free. Usage count = 2. problem.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
debian логотип
CVE-2026-22997

[net: can: j1939: j1939_xtp_rx_rts_session_active(): deactivate session upon receiving the second rts]

-
github логотип
GHSA-86mf-f3rq-8369

In the Linux kernel, the following vulnerability has been resolved: net: can: j1939: j1939_xtp_rx_rts_session_active(): deactivate session upon receiving the second rts Since j1939_session_deactivate_activate_next() in j1939_tp_rxtimer() is called only when the timer is enabled, we need to call j1939_session_deactivate_activate_next() if we cancelled the timer. Otherwise, refcount for j1939_session leaks, which will later appear as | unregister_netdevice: waiting for vcan0 to become free. Usage count = 2. problem.

15 дней назад

Уязвимостей на страницу