🔐 CVE Alert

CVE-2025-38087

UNKNOWN 0.0

net/sched: fix use-after-free in taprio_dev_notifier

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: net/sched: fix use-after-free in taprio_dev_notifier Since taprio’s taprio_dev_notifier() isn’t protected by an RCU read-side critical section, a race with advance_sched() can lead to a use-after-free. Adding rcu_read_lock() inside taprio_dev_notifier() prevents this.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Jun 30, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

Affected Versions

Linux / Linux
fed87cc6718ad5f80aa739fee3c5979a8b09d3a6 < 8c5713ce1ced75f9e9ed5c642ea3d2ba06ead69c fed87cc6718ad5f80aa739fee3c5979a8b09d3a6 < 8a008c89e5e5c5332e4c0a33d707db9ddd529f8a fed87cc6718ad5f80aa739fee3c5979a8b09d3a6 < b1547d28ba468bc3b88764efd13e4319bab63be8 fed87cc6718ad5f80aa739fee3c5979a8b09d3a6 < b160766e26d4e2e2d6fe2294e0b02f92baefcec5
Linux / Linux
6.3

References

NVD ↗ CVE.org ↗ EPSS Data ↗
git.kernel.org: https://git.kernel.org/stable/c/8c5713ce1ced75f9e9ed5c642ea3d2ba06ead69c git.kernel.org: https://git.kernel.org/stable/c/8a008c89e5e5c5332e4c0a33d707db9ddd529f8a git.kernel.org: https://git.kernel.org/stable/c/b1547d28ba468bc3b88764efd13e4319bab63be8 git.kernel.org: https://git.kernel.org/stable/c/b160766e26d4e2e2d6fe2294e0b02f92baefcec5