In the Linux kernel, the following vulnerability has been resolved: drm/xe/regsr: Remove register pool That pool implementation doesn't really work: if the krealloc happens to move the memory and return another address, the entries in the xarray become invalid, leading to use-after-free later: BUG: KASAN: slab-use-after-free in xeregsrapplymmio+0x570/0x760 [xe] Read of size 4 at addr ffff8881244b2590 by task modprobe/2753 Allocated by task 2753: kasansavestack+0x39/0x70 kasansavetrack+0x14/0x40 kasansaveallocinfo+0x37/0x60 _kasankmalloc+0xc3/0xd0 _kmallocnodetrackcallernoprof+0x200/0x6d0 kreallocnoprof+0x229/0x380 Simplify the code to fix the bug. A better pooling strategy may be added back later if needed. (cherry picked from commit e5283bd4dfecbd3335f43b62a68e24dae23f59e4)