[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <e783dbcedc9b444ca2651d2eac036d6e@realtek.com>
Date: Mon, 6 Nov 2023 06:42:37 +0000
From: Ping-Ke Shih <pkshih@...ltek.com>
To: Zheng Hacker <hackerzheng666@...il.com>,
Zheng Wang <zyytlz.wz@....com>
CC: "aspriel@...il.com" <aspriel@...il.com>,
"franky.lin@...adcom.com" <franky.lin@...adcom.com>,
"hante.meuleman@...adcom.com" <hante.meuleman@...adcom.com>,
"kvalo@...nel.org" <kvalo@...nel.org>,
"johannes.berg@...el.com" <johannes.berg@...el.com>,
"marcan@...can.st" <marcan@...can.st>,
"linus.walleij@...aro.org" <linus.walleij@...aro.org>,
"jisoo.jang@...sei.ac.kr" <jisoo.jang@...sei.ac.kr>,
"linuxlovemin@...sei.ac.kr" <linuxlovemin@...sei.ac.kr>,
"wataru.gohda@...ress.com" <wataru.gohda@...ress.com>,
"linux-wireless@...r.kernel.org" <linux-wireless@...r.kernel.org>,
"brcm80211-dev-list.pdl@...adcom.com"
<brcm80211-dev-list.pdl@...adcom.com>,
"SHA-cyfmac-dev-list@...ineon.com" <SHA-cyfmac-dev-list@...ineon.com>,
"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
"security@...nel.org" <security@...nel.org>,
"stable@...r.kernel.org" <stable@...r.kernel.org>
Subject: RE: [PATCH v3] brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach
> -----Original Message-----
> From: Zheng Hacker <hackerzheng666@...il.com>
> Sent: Monday, November 6, 2023 1:16 PM
> To: Zheng Wang <zyytlz.wz@....com>
> Cc: aspriel@...il.com; franky.lin@...adcom.com; hante.meuleman@...adcom.com; kvalo@...nel.org;
> johannes.berg@...el.com; marcan@...can.st; linus.walleij@...aro.org; jisoo.jang@...sei.ac.kr;
> linuxlovemin@...sei.ac.kr; wataru.gohda@...ress.com; linux-wireless@...r.kernel.org;
> brcm80211-dev-list.pdl@...adcom.com; SHA-cyfmac-dev-list@...ineon.com; linux-kernel@...r.kernel.org;
> security@...nel.org; stable@...r.kernel.org
> Subject: Re: [PATCH v3] brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach
subject prefix "wif: brcmfmac: ..."
Try "git log --oneline drivers/net/wireless/broadcom/brcm80211/brcmfmac" to know that.
>
> This is the candidate patch of CVE-2023-47233 :
> https://nvd.nist.gov/vuln/detail/CVE-2023-47233
I think you can add this link to commit message as well.
Powered by blists - more mailing lists