In the Linux kernel, the following vulnerability has been resolved:Revert "block, bfq: merge bfq_release_process_ref() into bfq_put_cooperator()"This reverts commit bc3b1e9e7c50e1de0f573eea3871db61dd4787de.The bic is associated with sync_bfqq, and bfq_release_process_ref cannotbe put into bfq_put_cooperator.kasan report:[ 400.347277] ==================================================================[ 400.347287] BUG: KASAN: slab-use-after-free in bic_set_bfqq+0x200/0x230[ 400.347420] Read of size 8 at addr ffff88881cab7d60 by task dockerd/5800[ 400.347430][ 400.347436] CPU: 24 UID: 0 PID: 5800 Comm: dockerd Kdump: loaded Tainted: G E 6.12.0 #32[ 400.347450] Tainted: [E]=UNSIGNED_MODULE[ 400.347454] Hardware name: VMware, Inc. VMware20,1/440BX Desktop Reference Platform, BIOS VMW201.00V.20192059.B64.2207280713 07/28/2022[ 400.347460] Call Trace:[ 400.347464]
No PoCs from references.
- https://github.com/cku-heise/euvd-api-doc