In the Linux kernel, the following vulnerability has been resolved:
net/sched: fix use-after-free in tapriodevnotifier
Since taprio’s tapriodevnotifier() isn’t protected by an RCU read-side critical section, a race with advance_sched() can lead to a use-after-free.
Adding rcureadlock() inside tapriodevnotifier() prevents this.
{
"cna_assigner": "Linux",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38087.json"
}