RE: [PATCH v3] brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach

From: Ping-Ke Shih
Date: Mon Nov 06 2023 - 01:43:32 EST




> -----Original Message-----
> From: Zheng Hacker <hackerzheng666@xxxxxxxxx>
> Sent: Monday, November 6, 2023 1:16 PM
> To: Zheng Wang <zyytlz.wz@xxxxxxx>
> Cc: aspriel@xxxxxxxxx; franky.lin@xxxxxxxxxxxx; hante.meuleman@xxxxxxxxxxxx; kvalo@xxxxxxxxxx;
> johannes.berg@xxxxxxxxx; marcan@xxxxxxxxx; linus.walleij@xxxxxxxxxx; jisoo.jang@xxxxxxxxxxxx;
> linuxlovemin@xxxxxxxxxxxx; wataru.gohda@xxxxxxxxxxx; linux-wireless@xxxxxxxxxxxxxxx;
> brcm80211-dev-list.pdl@xxxxxxxxxxxx; SHA-cyfmac-dev-list@xxxxxxxxxxxx; linux-kernel@xxxxxxxxxxxxxxx;
> security@xxxxxxxxxx; stable@xxxxxxxxxxxxxxx
> Subject: Re: [PATCH v3] brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach

subject prefix "wif: brcmfmac: ..."
Try "git log --oneline drivers/net/wireless/broadcom/brcm80211/brcmfmac" to know that.

>
> This is the candidate patch of CVE-2023-47233 :
> https://nvd.nist.gov/vuln/detail/CVE-2023-47233

I think you can add this link to commit message as well.