-

CVE-2025-38087

In the Linux kernel, the following vulnerability has been resolved:

net/sched: fix use-after-free in taprio_dev_notifier

Since taprio’s taprio_dev_notifier() isn’t protected by an
RCU read-side critical section, a race with advance_sched()
can lead to a use-after-free.

Adding rcu_read_lock() inside taprio_dev_notifier() prevents this.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < 8c5713ce1ced75f9e9ed5c642ea3d2ba06ead69c
Version fed87cc6718ad5f80aa739fee3c5979a8b09d3a6
Status affected
Version < 8a008c89e5e5c5332e4c0a33d707db9ddd529f8a
Version fed87cc6718ad5f80aa739fee3c5979a8b09d3a6
Status affected
Version < b1547d28ba468bc3b88764efd13e4319bab63be8
Version fed87cc6718ad5f80aa739fee3c5979a8b09d3a6
Status affected
Version < b160766e26d4e2e2d6fe2294e0b02f92baefcec5
Version fed87cc6718ad5f80aa739fee3c5979a8b09d3a6
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 6.3
Status affected
Version < 6.3
Version 0
Status unaffected
Version <= 6.6.*
Version 6.6.95
Status unaffected
Version <= 6.12.*
Version 6.12.35
Status unaffected
Version <= 6.15.*
Version 6.15.4
Status unaffected
Version <= *
Version 6.16
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.03% 0.058
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string