In the Linux kernel, the following vulnerability has been resolved: net: broadcom: bcm4908_enet: update TX stats after actual transmission Queueing packets doesn't guarantee their transmission. Update TX stats after hardware confirms consuming submitted data. This also fixes a possible race and NULL dereference. bcm4908_enet_start_xmit() could try to access skb after freeing it in the bcm4908_enet_poll_tx().
https://git.kernel.org/stable/c/ef3556ee16c68735ec69bd08df41d1cd83b14ad3
https://git.kernel.org/stable/c/c9589e18a60c55c76772a38117ef9a16b942e56b
https://git.kernel.org/stable/c/2adedc80faec243ede55355e57142110d6f46e08