In the Linux kernel, the following vulnerability has been resolved:
iio: trigger: sysfs: fix use-after-free on remove
Ensure that the irq_work has completed before the trigger is freed.
================================================================== BUG: KASAN: use-after-free in irqworkrun_list Read of size 8 at addr 0000000064702248 by task python3/25
Call Trace: irqworkrunlist irqworktick updateprocesstimes tickschedhandle tickschedtimer _hrtimerrunqueues hrtimer_interrupt
Allocated by task 25: kmemcachealloctrace iiosysfstrigadd devattrstore sysfskfwrite kernfsfopwriteiter newsyncwrite vfswrite ksyswrite syswrite
Freed by task 25: kfree iiosysfstrigremove devattrstore sysfskfwrite kernfsfopwriteiter newsyncwrite vfswrite ksyswrite sys_write
==================================================================