We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
Assigner | Linux |
Reserved | 2024-02-19 |
Published | 2024-05-01 |
Updated | 2024-08-02 |
In the Linux kernel, the following vulnerability has been resolved: wifi: rtl8xxxu: add cancel_work_sync() for c2hcmd_work The workqueue might still be running, when the driver is stopped. To avoid a use-after-free, call cancel_work_sync() in rtl8xxxu_stop().
https://git.kernel.org/stable/c/dddedfa3b29a63c2ca4336663806a6128b8545b4
https://git.kernel.org/stable/c/ac512507ac89c01ed6cd4ca53032f52cdb23ea59
https://git.kernel.org/stable/c/3518cea837de4d106efa84ddac18a07b6de1384e
https://git.kernel.org/stable/c/156012667b85ca7305cb363790d3ae8519a6f41e
https://git.kernel.org/stable/c/7059cdb69f8e1a2707dd1e2f363348b507ed7707
https://git.kernel.org/stable/c/58fe3bbddfec10c6b216096d8c0e517cd8463e3a
https://git.kernel.org/stable/c/1213acb478a7181cd73eeaf00db430f1e45b1361
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html