CVE-2021-47017

In the Linux kernel, the following vulnerability has been resolved: ath10k: Fix a use after free in ath10k_htc_send_bundle In ath10k_htc_send_bundle, the bundle_skb could be freed by dev_kfree_skb_any(bundle_skb). But the bundle_skb is used later by bundle_skb->len. As skb_len = bundle_skb->len, my patch replaces bundle_skb->len to skb_len after the bundle_skb was freed.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

09 Dec 2024, 17:59

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE CWE-416
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
First Time Linux linux Kernel
Linux
References () https://git.kernel.org/stable/c/3b1ac40c6012140828caa79e592a438a18ebf71b - () https://git.kernel.org/stable/c/3b1ac40c6012140828caa79e592a438a18ebf71b - Patch
References () https://git.kernel.org/stable/c/5e413c0831ff4700d1739db3fa3ae9f859744676 - () https://git.kernel.org/stable/c/5e413c0831ff4700d1739db3fa3ae9f859744676 - Patch
References () https://git.kernel.org/stable/c/8392df5d7e0b6a7d21440da1fc259f9938f4dec3 - () https://git.kernel.org/stable/c/8392df5d7e0b6a7d21440da1fc259f9938f4dec3 - Patch
References () https://git.kernel.org/stable/c/8bb054fb336f4250002fff4e0b075221c05c3c65 - () https://git.kernel.org/stable/c/8bb054fb336f4250002fff4e0b075221c05c3c65 - Patch

Information

Published : 2024-02-28 09:15

Updated : 2024-12-09 17:59


NVD link : CVE-2021-47017

Mitre link : CVE-2021-47017

CVE.ORG link : CVE-2021-47017


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-416

Use After Free