In the Linux kernel, the following vulnerability has been resolved: scsi: ufs: bsg: Set bsg_queue to NULL after removal Currently, this does not cause any issues, but I believe it is necessary to set bsg_queue to NULL after removing it to prevent potential use-after-free (UAF) access.
Upstream advisory: https://lore.kernel.org/linux-cve-announce/2025022602-CVE-2024-54458-75cd@gregkh/T