CVE-2025-38087
In the Linux kernel, the following vulnerability has been resolved:
net/sched: fix use-after-free in taprio_dev_notifier
Since taprio’s taprio_dev_notifier() isn’t protected by an
RCU read-side critical section, a race with advance_sched()
can lead to a use-after-free.
Adding rcu_read_lock() inside taprio_dev_notifier() prevents this.
Assigner : cve@kernel.org
More information : https://git.kernel.org/stable/c/8a008c89e5e5c5332e4c0a33d707db9ddd529f8a