In the Linux kernel, the following vulnerability has been resolved: net/sched: fix use-after-free in tapriodevnotifier Since taprio’s tapriodevnotifier() isn’t protected by an RCU read-side critical section, a race with advancesched() can lead to a use-after-free. Adding rcureadlock() inside tapriodev_notifier() prevents this.