In the Linux kernel, the following vulnerability has been resolved: ath10k:
Fix a use after free in ath10k_htc_send_bundle In ath10k_htc_send_bundle,
the bundle_skb could be freed by dev_kfree_skb_any(bundle_skb). But the
bundle_skb is used later by bundle_skb->len. As skb_len = bundle_skb->len,
my patch replaces bundle_skb->len to skb_len after the bundle_skb was
freed.
git.kernel.org/linus/8392df5d7e0b6a7d21440da1fc259f9938f4dec3 (5.13-rc1)
git.kernel.org/stable/c/3b1ac40c6012140828caa79e592a438a18ebf71b
git.kernel.org/stable/c/5e413c0831ff4700d1739db3fa3ae9f859744676
git.kernel.org/stable/c/8392df5d7e0b6a7d21440da1fc259f9938f4dec3
git.kernel.org/stable/c/8bb054fb336f4250002fff4e0b075221c05c3c65
launchpad.net/bugs/cve/CVE-2021-47017
nvd.nist.gov/vuln/detail/CVE-2021-47017
security-tracker.debian.org/tracker/CVE-2021-47017
www.cve.org/CVERecord?id=CVE-2021-47017