In the Linux kernel, the following vulnerability has been resolved:block, bfq: fix bfqq uaf in bfq_limit_depth()Set new allocated bfqq to bic or remove freed bfqq from bic are bothprotected by bfqd->lock, however bfq_limit_depth() is deferencing bfqqfrom bic without the lock, this can lead to UAF if the io_context isshared by multiple tasks.For example, test bfq with io_uring can trigger following UAF in v6.6:==================================================================BUG: KASAN: slab-use-after-free in bfqq_group+0x15/0x50Call Trace:
No PoCs from references.
- https://github.com/bygregonline/devsec-fastapi-report
- https://github.com/runwhen-contrib/helm-charts
- https://github.com/w4zu/Debian_security