[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20240806015904.1004435-1-wirelessdonghack@gmail.com>
Date: Tue, 6 Aug 2024 09:59:04 +0800
From: LidongLI <wirelessdonghack@...il.com>
To: gregkh@...uxfoundation.org
Cc: kvalo@...nel.org,
linux-kernel@...r.kernel.org,
linux-usb@...r.kernel.org,
linux-wireless@...r.kernel.org,
mark.esler@...onical.com,
stf_xl@...pl,
wirelessdonghack@...il.com
Subject: Re: Ubuntu RT2X00 WIFI USB Driver Kernel NULL pointer Dereference&Use-After-Free Vulnerability
Dear Greg,
Thank you, Greg!
Yes, as you mentioned, it requires users to create their own udev rules, which is not common among Ubuntu personal users. However, in some non-personal user scenarios, they must pre-add udev rules to meet their needs. A simple example: in some Ubuntu embedded Linux scenarios, we found that when starting a wireless hotspot, developers must configure udev rules to ensure a stable connection, enable auto-loading of drivers, or auto-run or write USB-based auto-configuration scripts.
Alright, thank you for your fix. We will proceed to the email you specified to request a CVE.
Powered by blists - more mailing lists