We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-38087

net/sched: fix use-after-free in taprio_dev_notifier



Description

In the Linux kernel, the following vulnerability has been resolved: net/sched: fix use-after-free in taprio_dev_notifier Since taprio’s taprio_dev_notifier() isn’t protected by an RCU read-side critical section, a race with advance_sched() can lead to a use-after-free. Adding rcu_read_lock() inside taprio_dev_notifier() prevents this.

Reserved 2025-04-16 | Published 2025-06-30 | Updated 2025-06-30 | Assigner Linux

Product status

Default status
unaffected

fed87cc6718ad5f80aa739fee3c5979a8b09d3a6 before 8c5713ce1ced75f9e9ed5c642ea3d2ba06ead69c
affected

fed87cc6718ad5f80aa739fee3c5979a8b09d3a6 before 8a008c89e5e5c5332e4c0a33d707db9ddd529f8a
affected

fed87cc6718ad5f80aa739fee3c5979a8b09d3a6 before b1547d28ba468bc3b88764efd13e4319bab63be8
affected

fed87cc6718ad5f80aa739fee3c5979a8b09d3a6 before b160766e26d4e2e2d6fe2294e0b02f92baefcec5
affected

Default status
affected

6.3
affected

Any version before 6.3
unaffected

6.6.95
unaffected

6.12.35
unaffected

6.15.4
unaffected

6.16-rc3
unaffected

References

git.kernel.org/...c/8c5713ce1ced75f9e9ed5c642ea3d2ba06ead69c

git.kernel.org/...c/8a008c89e5e5c5332e4c0a33d707db9ddd529f8a

git.kernel.org/...c/b1547d28ba468bc3b88764efd13e4319bab63be8

git.kernel.org/...c/b160766e26d4e2e2d6fe2294e0b02f92baefcec5

cve.org (CVE-2025-38087)

nvd.nist.gov (CVE-2025-38087)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-38087

Support options

Helpdesk Chat, Email, Knowledgebase