Ping-Ke Shih <pkshih@xxxxxxxxxxx> 于2023年11月6日周一 14:43写道: > > > > > -----Original Message----- > > From: Zheng Hacker <hackerzheng666@xxxxxxxxx> > > Sent: Monday, November 6, 2023 1:16 PM > > To: Zheng Wang <zyytlz.wz@xxxxxxx> > > Cc: aspriel@xxxxxxxxx; franky.lin@xxxxxxxxxxxx; hante.meuleman@xxxxxxxxxxxx; kvalo@xxxxxxxxxx; > > johannes.berg@xxxxxxxxx; marcan@xxxxxxxxx; linus.walleij@xxxxxxxxxx; jisoo.jang@xxxxxxxxxxxx; > > linuxlovemin@xxxxxxxxxxxx; wataru.gohda@xxxxxxxxxxx; linux-wireless@xxxxxxxxxxxxxxx; > > brcm80211-dev-list.pdl@xxxxxxxxxxxx; SHA-cyfmac-dev-list@xxxxxxxxxxxx; linux-kernel@xxxxxxxxxxxxxxx; > > security@xxxxxxxxxx; stable@xxxxxxxxxxxxxxx > > Subject: Re: [PATCH v3] brcmfmac: Fix use-after-free bug in brcmf_cfg80211_detach > > subject prefix "wif: brcmfmac: ..." > Try "git log --oneline drivers/net/wireless/broadcom/brcm80211/brcmfmac" to know that. > Get it! Thanks for your kind reminder. > > > > This is the candidate patch of CVE-2023-47233 : > > https://nvd.nist.gov/vuln/detail/CVE-2023-47233 > > I think you can add this link to commit message as well. > > Will apply your suggestion in the next version. Best regrads, Zheng