In the Linux kernel, the following vulnerability has been resolved: ath10k: Fix a use after free in ath10k_htc_send_bundle In ath10k_htc_send_bundle, the bundle_skb could be freed by dev_kfree_skb_any(bundle_skb). But the bundle_skb is used later by bundle_skb->len. As skb_len = bundle_skb->len, my patch replaces bundle_skb->len to skb_len after the bundle_skb was freed. https://git.kernel.org/stable/c/3b1ac40c6012140828caa79e592a438a18ebf71b https://git.kernel.org/stable/c/5e413c0831ff4700d1739db3fa3ae9f859744676 https://git.kernel.org/stable/c/8392df5d7e0b6a7d21440da1fc259f9938f4dec3 https://git.kernel.org/stable/c/8bb054fb336f4250002fff4e0b075221c05c3c65
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 2266589]
This was fixed for Fedora with the 5.12.4 stable kernel update.
The result of automatic check (that is developed by Alexander Larkin) for this CVE-2021-47017 is: CHECK Maybe valid. Check manually. with impact MODERATE (that is approximation based on flags REMOTE SIMPLEFIX UAF SKB ; these flags parsed automatically based on patche data). Such automatic check happens only for Low/Moderates (and only when not from reporter, but parsing already existing CVE). Highs always checked manually (I check it myself and then we check it again in Remediation team). In rare cases some of the Moderates could be increased to High later.