In the Linux kernel, the following vulnerability has been resolved:
block, bfq: fix uaf for bfqq in bicsetbfqq()
After commit 64dc8c732f5c ("block, bfq: fix possible uaf for 'bfqq->bic'"), bic->bfqq will be accessed in bicsetbfqq(), however, in some context bic->bfqq will be freed, and bicsetbfqq() is called with the freed bic->bfqq.
Fix the problem by always freeing bfqq after bicsetbfqq().