lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <e783dbcedc9b444ca2651d2eac036d6e@realtek.com>
Date:   Mon, 6 Nov 2023 06:42:37 +0000
From:   Ping-Ke Shih <pkshih@...ltek.com>
To:     Zheng Hacker <hackerzheng666@...il.com>,
        Zheng Wang <zyytlz.wz@....com>
CC:     "aspriel@...il.com" <aspriel@...il.com>,
        "franky.lin@...adcom.com" <franky.lin@...adcom.com>,
        "hante.meuleman@...adcom.com" <hante.meuleman@...adcom.com>,
        "kvalo@...nel.org" <kvalo@...nel.org>,
        "johannes.berg@...el.com" <johannes.berg@...el.com>,
        "marcan@...can.st" <marcan@...can.st>,
        "linus.walleij@...aro.org" <linus.walleij@...aro.org>,
        "jisoo.jang@...sei.ac.kr" <jisoo.jang@...sei.ac.kr>,
        "linuxlovemin@...sei.ac.kr" <linuxlovemin@...sei.ac.kr>,
        "wataru.gohda@...ress.com" <wataru.gohda@...ress.com>,
        "linux-wireless@...r.kernel.org" <linux-wireless@...r.kernel.org>,
        "brcm80211-dev-list.pdl@...adcom.com" 
        <brcm80211-dev-list.pdl@...adcom.com>,
        "SHA-cyfmac-dev-list@...ineon.com" <SHA-cyfmac-dev-list@...ineon.com>,
        "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
        "security@...nel.org" <security@...nel.org>,
        "stable@...r.kernel.org" <stable@...r.kernel.org>
Subject: RE: [PATCH v3] brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach



> -----Original Message-----
> From: Zheng Hacker <hackerzheng666@...il.com>
> Sent: Monday, November 6, 2023 1:16 PM
> To: Zheng Wang <zyytlz.wz@....com>
> Cc: aspriel@...il.com; franky.lin@...adcom.com; hante.meuleman@...adcom.com; kvalo@...nel.org;
> johannes.berg@...el.com; marcan@...can.st; linus.walleij@...aro.org; jisoo.jang@...sei.ac.kr;
> linuxlovemin@...sei.ac.kr; wataru.gohda@...ress.com; linux-wireless@...r.kernel.org;
> brcm80211-dev-list.pdl@...adcom.com; SHA-cyfmac-dev-list@...ineon.com; linux-kernel@...r.kernel.org;
> security@...nel.org; stable@...r.kernel.org
> Subject: Re: [PATCH v3] brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach

subject prefix "wif: brcmfmac: ..."
Try "git log --oneline drivers/net/wireless/broadcom/brcm80211/brcmfmac" to know that. 

> 
> This is the candidate patch of CVE-2023-47233 :
> https://nvd.nist.gov/vuln/detail/CVE-2023-47233

I think you can add this link to commit message as well. 


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ