In the Linux kernel, the following vulnerability has been resolved: HSI: ssiprotocol: Fix use after free vulnerability in ssiprotocol Driver Due to Race Condition In the ssiprotocolprobe() function, &ssi->work is bound with ssipxmitwork(), In ssippnsetup(), the ssippnxmit() function within the ssippnops structure is capable of starting the work. If we remove the module which will call ssiprotocolremove() to make a cleanup, it will free ssi through kfree(ssi), while the work mentioned above will be used. The sequence of operations that may lead to a UAF bug is as follows: CPU0 CPU1 | ssipxmitwork ssiprotocolremove | kfree(ssi); | | struct hsiclient *cl = ssi->cl; | // use ssi Fix it by ensuring that the work is canceled before proceeding with the cleanup in ssiprotocol_remove().