In the Linux kernel, the following vulnerability has been resolved: scsi: sg: Avoid sg device teardown race sg_remove_sfp_usercontext() must not use sg_device_destroy() after calling scsi_device_put(). sg_device_destroy() is accessing the parent scsi_device request_queue which will already be set to NULL when the preceding call to scsi_device_put() removed the last reference to the parent scsi_device. The resulting NULL pointer exception will then crash the kernel.
git.kernel.org/linus/27f58c04a8f438078583041468ec60597841284d
git.kernel.org/stable/c/27f58c04a8f438078583041468ec60597841284d
git.kernel.org/stable/c/46af9047523e2517712ae8e71d984286c626e022
git.kernel.org/stable/c/b0d1ebcc1a9560e494ea9b3ee808540db26c5086
ubuntu.com/security/CVE-2024-35954
ubuntu.com/security/notices/USN-6893-1
ubuntu.com/security/notices/USN-6893-2
ubuntu.com/security/notices/USN-6893-3
ubuntu.com/security/notices/USN-6918-1
www.cve.org/CVERecord?id=CVE-2024-35954