In the Linux kernel, the following vulnerability has been resolved: block, bfq: fix uaf for bfqq in bicsetbfqq() After commit 64dc8c732f5c ("block, bfq: fix possible uaf for 'bfqq->bic'"), bic->bfqq will be accessed in bicsetbfqq(), however, in some context bic->bfqq will be freed, and bicsetbfqq() is called with the freed bic->bfqq. Fix the problem by always freeing bfqq after bicsetbfqq().