We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: net/sched: fix use-after-free in taprio_dev_notifier Since taprio’s taprio_dev_notifier() isn’t protected by an RCU read-side critical section, a race with advance_sched() can lead to a use-after-free. Adding rcu_read_lock() inside taprio_dev_notifier() prevents this.
Reserved 2025-04-16 | Published 2025-06-30 | Updated 2025-06-30 | Assigner Linuxgit.kernel.org/...c/8c5713ce1ced75f9e9ed5c642ea3d2ba06ead69c
git.kernel.org/...c/8a008c89e5e5c5332e4c0a33d707db9ddd529f8a
git.kernel.org/...c/b1547d28ba468bc3b88764efd13e4319bab63be8
git.kernel.org/...c/b160766e26d4e2e2d6fe2294e0b02f92baefcec5
Support options