Use After Free Affecting kernel package, versions *
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RHEL7-KERNEL-6329435
- published 29 Feb 2024
- disclosed 28 Feb 2024
Introduced: 28 Feb 2024
CVE-2021-47017 Open this link in a new tabHow to fix?
There is no fixed version for RHEL:7
kernel
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream kernel
package and not the kernel
package as distributed by RHEL
.
See How to fix?
for RHEL:7
relevant fixed versions and status.
In the Linux kernel, the following vulnerability has been resolved:
ath10k: Fix a use after free in ath10k_htc_send_bundle
In ath10k_htc_send_bundle, the bundle_skb could be freed by dev_kfree_skb_any(bundle_skb). But the bundle_skb is used later by bundle_skb->len.
As skb_len = bundle_skb->len, my patch replaces bundle_skb->len to skb_len after the bundle_skb was freed.
References
- https://access.redhat.com/security/cve/CVE-2021-47017
- https://git.kernel.org/stable/c/3b1ac40c6012140828caa79e592a438a18ebf71b
- https://git.kernel.org/stable/c/5e413c0831ff4700d1739db3fa3ae9f859744676
- https://git.kernel.org/stable/c/8392df5d7e0b6a7d21440da1fc259f9938f4dec3
- https://git.kernel.org/stable/c/8bb054fb336f4250002fff4e0b075221c05c3c65