In the Linux kernel, the following vulnerability has been resolved:Bluetooth: btmtk: avoid UAF in btmtk_process_coredumphci_devcd_append may lead to the release of the skb, so it cannot beaccessed once it is called.==================================================================BUG: KASAN: slab-use-after-free in btmtk_process_coredump+0x2a7/0x2d0 [btmtk]Read of size 4 at addr ffff888033cfabb0 by task kworker/0:3/82CPU: 0 PID: 82 Comm: kworker/0:3 Tainted: G U 6.6.40-lockdep-03464-g1d8b4eb3060e #1 b0b3c1cc0c842735643fb411799d97921d1f688cHardware name: Google Yaviks_Ufs/Yaviks_Ufs, BIOS Google_Yaviks_Ufs.15217.552.0 05/07/2024Workqueue: events btusb_rx_work [btusb]Call Trace:
No PoCs from references.
- https://github.com/cku-heise/euvd-api-doc
- https://github.com/oogasawa/Utility-security