First published: Wed Feb 28 2024(Updated: )
In the Linux kernel, the following vulnerability has been resolved: ath10k: Fix a use after free in ath10k_htc_send_bundle In ath10k_htc_send_bundle, the bundle_skb could be freed by dev_kfree_skb_any(bundle_skb). But the bundle_skb is used later by bundle_skb->len. As skb_len = bundle_skb->len, my patch replaces bundle_skb->len to skb_len after the bundle_skb was freed.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=5.8<5.10.37 | |
Linux Kernel | >=5.11<5.11.21 | |
Linux Kernel | >=5.12<5.12.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-47017 is categorized with a high severity due to the potential for a use after free vulnerability that could lead to arbitrary code execution.
To fix CVE-2021-47017, users should update their Linux kernel to versions 5.10.37 or later, or 5.11.21 or later, or 5.12.4 or later.
CVE-2021-47017 affects Linux kernel versions between 5.8 to 5.10.37, 5.11 to 5.11.21, and 5.12 to 5.12.4.
Exploitation of CVE-2021-47017 could allow an attacker to execute arbitrary code on the affected system, potentially leading to system compromise.
Users running vulnerable versions of the Linux kernel, particularly those using wireless drivers related to ath10k, are impacted by CVE-2021-47017.