In the Linux kernel, the following vulnerability has been resolved:
ath10k: Fix a use after free in ath10khtcsend_bundle
In ath10khtcsendbundle, the bundleskb could be freed by devkfreeskbany(bundleskb). But the bundleskb is used later by bundleskb->len.
As skblen = bundleskb->len, my patch replaces bundleskb->len to skblen after the bundle_skb was freed.
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-47017.json"
[
{
"events": [
{
"introduced": "5.8"
},
{
"fixed": "5.10.37"
}
]
},
{
"events": [
{
"introduced": "5.11"
},
{
"fixed": "5.11.21"
}
]
},
{
"events": [
{
"introduced": "5.12"
},
{
"fixed": "5.12.4"
}
]
}
]