In the Linux kernel, the following vulnerability has been resolved:block, bfq: fix waker_bfqq UAF after bfq_split_bfqq()Our syzkaller report a following UAF for v6.6:BUG: KASAN: slab-use-after-free in bfq_init_rq+0x175d/0x17a0 block/bfq-iosched.c:6958Read of size 8 at addr ffff8881b57147d8 by task fsstress/232726CPU: 2 PID: 232726 Comm: fsstress Not tainted 6.6.0-g3629d1885222 #39Call Trace:
No PoCs from references.
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/oogasawa/Utility-security
- https://github.com/w4zu/Debian_security