In the Linux kernel, the following vulnerability has been resolved: iio: trigger: sysfs: fix use-after-free on remove Ensure that the irqwork has completed before the trigger is freed. ================================================================== BUG: KASAN: use-after-free in irqworkrunlist Read of size 8 at addr 0000000064702248 by task python3/25 Call Trace: irqworkrunlist irqworktick updateprocesstimes tickschedhandle tickschedtimer _hrtimerrunqueues hrtimerinterrupt Allocated by task 25: kmemcachealloctrace iiosysfstrigadd devattrstore sysfskfwrite kernfsfopwriteiter newsyncwrite vfswrite ksyswrite syswrite Freed by task 25: kfree iiosysfstrigremove devattrstore sysfskfwrite kernfsfopwriteiter newsyncwrite vfswrite ksyswrite syswrite ==================================================================