blob: ec7f1f11f5c66fc661046ed602651c3bc30534e1 (
plain) (
blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
|
Description: AoE: improper reference count leads to use-after-free vulnerability
References:
https://bugzilla.redhat.com/show_bug.cgi?id=2256786
https://www.zerodayinitiative.com/advisories/ZDI-CAN-22236/
Notes:
carnil> Commit fixes 7562f876cd93 ("[NET]: Rework dev_base via
carnil> list_head (v3)")
Bugs:
upstream: released (6.9-rc1) [f98364e926626c678fb4b9004b75cacf92ff0662]
6.1-upstream-stable: released (6.1.83) [74ca3ef68d2f449bc848c0a814cefc487bf755fa]
5.10-upstream-stable: released (5.10.214) [faf0b4c5e00bb680e8e43ac936df24d3f48c8e65]
4.19-upstream-stable: released (4.19.311) [ad80c34944d7175fa1f5c7a55066020002921a99]
sid: needed
6.1-bookworm-security: needed
5.10-bullseye-security: needed
4.19-buster-security: needed
|