In the Linux kernel, the following vulnerability has been resolved:media: vidtv: Terminating the subsequent process of initialization failuresyzbot reported a slab-use-after-free Read in vidtv_mux_init. [1]After PSI initialization fails, the si member is accessed again, resultingin this uaf.After si initialization fails, the subsequent process needs to be exited.[1]BUG: KASAN: slab-use-after-free in vidtv_mux_pid_ctx_init drivers/media/test-drivers/vidtv/vidtv_mux.c:78 [inline]BUG: KASAN: slab-use-after-free in vidtv_mux_init+0xac2/0xbe0 drivers/media/test-drivers/vidtv/vidtv_mux.c:524Read of size 8 at addr ffff88802fa42acc by task syz.2.37/6059CPU: 0 UID: 0 PID: 6059 Comm: syz.2.37 Not tainted 6.14.0-rc5-syzkaller #0Hardware name: Google Compute Engine, BIOS Google 02/12/2025Call Trace:
No PoCs from references.
- https://github.com/w4zu/Debian_security