In the Linux kernel, the following vulnerability has been resolved:
net/sched: fix use-after-free in taprio_dev_notifier
Since taprio’s taprio_dev_notifier() isn’t protected by an
RCU read-side critical section, a race with advance_sched()
can lead to a use-after-free.
Adding rcu_read_lock() inside taprio_dev_notifier() prevents this.
Metrics
Affected Vendors & Products
References
History
Tue, 01 Jul 2025 00:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Mon, 30 Jun 2025 07:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: net/sched: fix use-after-free in taprio_dev_notifier Since taprio’s taprio_dev_notifier() isn’t protected by an RCU read-side critical section, a race with advance_sched() can lead to a use-after-free. Adding rcu_read_lock() inside taprio_dev_notifier() prevents this. | |
Title | net/sched: fix use-after-free in taprio_dev_notifier | |
References |
|

Status: PUBLISHED
Assigner: Linux
Published: 2025-06-30T07:29:43.325Z
Updated: 2025-07-28T04:12:01.642Z
Reserved: 2025-04-16T04:51:23.982Z
Link: CVE-2025-38087

No data.

Status : Awaiting Analysis
Published: 2025-06-30T08:15:22.607
Modified: 2025-06-30T18:38:23.493
Link: CVE-2025-38087
