In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_tcm: Don't free command immediately Don't prematurely free the command. Wait for the status completion of the sense status. It can be freed then. Otherwise we will double-free the command.
https://git.kernel.org/stable/c/f0c33e7d387ccbb6870e73a43c558fefede06614
https://git.kernel.org/stable/c/e6693595bd1b55af62d057a4136a89d5c2ddf0e9
https://git.kernel.org/stable/c/c225d006a31949d673e646d585d9569bc28feeb9
https://git.kernel.org/stable/c/bbb7f49839b57d66ccaf7b5752d9b63d3031dd0a
https://git.kernel.org/stable/c/929b69810eec132b284ffd19047a85d961df9e4d
https://git.kernel.org/stable/c/7cb72dc08ed8da60fd6d1f6adf13bf0e6ee0f694
https://git.kernel.org/stable/c/38229c35a6d7875697dfb293356407330cfcd23e
https://git.kernel.org/stable/c/16907219ad6763f401700e1b57b2da4f3e07f047