The Linux kernel’s tracing subsystem received a targeted security fix for a subtle but real use‑after‑free risk: the trace event verifier previously skipped certain complex pointer formats such as "%*p..", allowing tracepoints to reference memory that might be freed before a trace reader...