In the Linux kernel, the following vulnerability has been resolved:net: rose: fix timer races against user threadsRose timers only acquire the socket spinlock, withoutchecking if the socket is owned by one user thread.Add a check and rearm the timers if needed.BUG: KASAN: slab-use-after-free in rose_timer_expiry+0x31d/0x360 net/rose/rose_timer.c:174Read of size 2 at addr ffff88802f09b82a by task swapper/0/0CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted 6.13.0-rc5-syzkaller-00172-gd1bf27c4e176 #0Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024Call Trace:
No PoCs from references.
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/runwhen-contrib/helm-charts
- https://github.com/w4zu/Debian_security