You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Hi,
we have detected that your project may be vulnerable to Use After Free in the function of outbound_phy_packet_callback in the file of trunk/linux-3.4.x/drivers/firewire/core-cdev.c . It shares similarities to a recent CVE disclosure CVE-2023-3159 in the linux.
The source vulnerability information is as follows:
Vulnerability Detail:
CVE Identifier: CVE-2023-3159
Description: A use after free issue was discovered in driver/firewire in outbound_phy_packet_callback in the Linux Kernel. In this flaw a local attacker with special privilege may cause a use after free problem when queue_event() fails.
Reference: https://nvd.nist.gov/vuln/detail/CVE-2023-3159
Patch: torvalds/linux@b7c81f8
Would you help to check if this bug is true? If it's true, I'd like to open a PR for that if necessary. Thank you for your effort and patience!
The text was updated successfully, but these errors were encountered:
Hi,
we have detected that your project may be vulnerable to Use After Free in the function of
outbound_phy_packet_callback
in the file oftrunk/linux-3.4.x/drivers/firewire/core-cdev.c
. It shares similarities to a recent CVE disclosure CVE-2023-3159 in the linux.The source vulnerability information is as follows:
Would you help to check if this bug is true? If it's true, I'd like to open a PR for that if necessary. Thank you for your effort and patience!
The text was updated successfully, but these errors were encountered: