In the Linux kernel, the following vulnerability has been resolved:RDMA/erdma: Prevent use-after-free in erdma_accept_newconn()After the erdma_cep_put(new_cep) being called, new_cep will be freed,and the following dereference will cause a UAF problem. Fix this issue.
No PoCs from references.
- https://github.com/w4zu/Debian_security