In the Linux kernel, the following vulnerability has been resolved:
block, bfq: fix uaf for bfqq in bicsetbfqq()
After commit 64dc8c732f5c ("block, bfq: fix possible uaf for 'bfqq->bic'"), bic->bfqq will be accessed in bicsetbfqq(), however, in some context bic->bfqq will be freed, and bicsetbfqq() is called with the freed bic->bfqq.
Fix the problem by always freeing bfqq after bicsetbfqq().
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52983.json"
}