In the Linux kernel, the following vulnerability has been resolved: wifi: cfg80211: cancel rfkillblock work in wiphyunregister() There is a use-after-free error in cfg80211shutdownallinterfaces found by syzkaller: BUG: KASAN: use-after-free in cfg80211shutdownallinterfaces+0x213/0x220 Read of size 8 at addr ffff888112a78d98 by task kworker/0:5/5326 CPU: 0 UID: 0 PID: 5326 Comm: kworker/0:5 Not tainted 6.19.0-rc2 #2 PREEMPT(voluntary) Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014 Workqueue: events cfg80211rfkillblockwork Call Trace: <TASK> dumpstacklvl+0x116/0x1f0 printreport+0xcd/0x630 kasanreport+0xe0/0x110 cfg80211shutdownallinterfaces+0x213/0x220 cfg80211rfkillblockwork+0x1e/0x30 processonework+0x9cf/0x1b70 workerthread+0x6c8/0xf10 kthread+0x3c5/0x780 retfromfork+0x56d/0x700 retfromforkasm+0x1a/0x30 </TASK> The problem arises due to the rfkillblock work is not cancelled when wiphy is being unregistered. In order to fix the issue cancel the corresponding work in wiphy_unregister(). Found by Linux Verification Center (linuxtesting.org) with Syzkaller.