> -----Original Message----- > From: Zheng Hacker <hackerzheng666@xxxxxxxxx> > Sent: Monday, November 6, 2023 1:16 PM > To: Zheng Wang <zyytlz.wz@xxxxxxx> > Cc: aspriel@xxxxxxxxx; franky.lin@xxxxxxxxxxxx; hante.meuleman@xxxxxxxxxxxx; kvalo@xxxxxxxxxx; > johannes.berg@xxxxxxxxx; marcan@xxxxxxxxx; linus.walleij@xxxxxxxxxx; jisoo.jang@xxxxxxxxxxxx; > linuxlovemin@xxxxxxxxxxxx; wataru.gohda@xxxxxxxxxxx; linux-wireless@xxxxxxxxxxxxxxx; > brcm80211-dev-list.pdl@xxxxxxxxxxxx; SHA-cyfmac-dev-list@xxxxxxxxxxxx; linux-kernel@xxxxxxxxxxxxxxx; > security@xxxxxxxxxx; stable@xxxxxxxxxxxxxxx > Subject: Re: [PATCH v3] brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach subject prefix "wif: brcmfmac: ..." Try "git log --oneline drivers/net/wireless/broadcom/brcm80211/brcmfmac" to know that. > > This is the candidate patch of CVE-2023-47233 : > https://nvd.nist.gov/vuln/detail/CVE-2023-47233 I think you can add this link to commit message as well.