In the Linux kernel, the following vulnerability has been resolved:
net/sched: fix use-after-free in tapriodevnotifier
Since taprio’s tapriodevnotifier() isn’t protected by an RCU read-side critical section, a race with advance_sched() can lead to a use-after-free.
Adding rcureadlock() inside tapriodevnotifier() prevents this.