In the Linux kernel, the following vulnerability has been resolved: netrom: fix double-free in nr_route_frame() In nr_route_frame(), old_skb is immediately freed without checking if nr_neigh->ax25 pointer is NULL. Therefore, if nr_neigh->ax25 is NULL, the caller function will free old_skb again, causing a double-free bug. Therefore, to prevent this, we need to modify it to check whether nr_neigh->ax25 is NULL before freeing old_skb.
5.10.103-15.10.103-1~bpo10+15.10.106-15.10.113-15.10.120-15.10.120-1~bpo10+15.10.127-15.10.127-25.10.127-2~bpo10+15.10.136-1+384 more6.1.106-16.1.106-26.1.106-36.1.112-16.1.115-16.1.119-16.1.123-16.1.124-16.1.128-16.1.129-1+230 more6.12.38-16.12.41-16.12.43-16.12.43-1~bpo12+16.12.48-16.12.57-16.12.57-1~bpo12+16.12.63-16.13.10-1~exp16.13.11-1~exp1+64 more