Description: AoE: improper reference count leads to use-after-free vulnerability References: https://bugzilla.redhat.com/show_bug.cgi?id=2256786 https://www.zerodayinitiative.com/advisories/ZDI-CAN-22236/ Notes: carnil> Commit fixes 7562f876cd93 ("[NET]: Rework dev_base via carnil> list_head (v3)") Bugs: upstream: released (6.9-rc1) [f98364e926626c678fb4b9004b75cacf92ff0662] 6.1-upstream-stable: released (6.1.83) [74ca3ef68d2f449bc848c0a814cefc487bf755fa] 5.10-upstream-stable: released (5.10.214) [faf0b4c5e00bb680e8e43ac936df24d3f48c8e65] 4.19-upstream-stable: released (4.19.311) [ad80c34944d7175fa1f5c7a55066020002921a99] sid: needed 6.1-bookworm-security: released (6.1.82-1) [bugfix/all/aoe-fix-the-potential-use-after-free-problem-in-aoec.patch] 5.10-bullseye-security: needed 4.19-buster-security: needed