In the Linux kernel, the following vulnerability has been resolved:
scsi: ufs: bsg: Set bsg_queue to NULL after removal
Currently, this does not cause any issues, but I believe it is necessary to
set bsg_queue to NULL after removing it to prevent potential use-after-free
(UAF) access.
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-02-27 03:15
Updated : 2025-11-03 20:16
NVD link : CVE-2024-54458
Mitre link : CVE-2024-54458
CVE.ORG link : CVE-2024-54458
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-416
Use After Free
