In the Linux kernel, the following vulnerability has been resolved: ipv6: fix possible UAF in ip6finishoutput2() If skbexpandhead() returns NULL, skb has been freed and associated dst/idev could also have been freed. We need to hold rcureadlock() to make sure the dst and associated idev are alive.