We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: block, bfq: fix uaf for bfqq in bic_set_bfqq() After commit 64dc8c732f5c ("block, bfq: fix possible uaf for 'bfqq->bic'"), bic->bfqq will be accessed in bic_set_bfqq(), however, in some context bic->bfqq will be freed, and bic_set_bfqq() is called with the freed bic->bfqq. Fix the problem by always freeing bfqq after bic_set_bfqq().
Reserved 2025-03-27 | Published 2025-03-27 | Updated 2025-05-04 | Assigner Linuxgit.kernel.org/...c/7f77f3dab5066a7c9da73d72d1eee895ff84a8d5
git.kernel.org/...c/511c922c5bf6c8a166bea826e702336bc2424140
git.kernel.org/...c/cb1876fc33af26d00efdd473311f1b664c77c44e
git.kernel.org/...c/b600de2d7d3a16f9007fad1bdae82a3951a26af2
Support options