-

CVE-2025-38087

In the Linux kernel, the following vulnerability has been resolved:

net/sched: fix use-after-free in taprio_dev_notifier

Since taprio’s taprio_dev_notifier() isn’t protected by an
RCU read-side critical section, a race with advance_sched()
can lead to a use-after-free.

Adding rcu_read_lock() inside taprio_dev_notifier() prevents this.

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 8c5713ce1ced75f9e9ed5c642ea3d2ba06ead69c
Version fed87cc6718ad5f80aa739fee3c5979a8b09d3a6
Status affected
Version < 8a008c89e5e5c5332e4c0a33d707db9ddd529f8a
Version fed87cc6718ad5f80aa739fee3c5979a8b09d3a6
Status affected
Version < b1547d28ba468bc3b88764efd13e4319bab63be8
Version fed87cc6718ad5f80aa739fee3c5979a8b09d3a6
Status affected
Version < b160766e26d4e2e2d6fe2294e0b02f92baefcec5
Version fed87cc6718ad5f80aa739fee3c5979a8b09d3a6
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 6.3
Status affected
Version < 6.3
Version 0
Status unaffected
Version <= 6.6.*
Version 6.6.95
Status unaffected
Version <= 6.12.*
Version 6.12.35
Status unaffected
Version <= 6.15.*
Version 6.15.4
Status unaffected
Version <= *
Version 6.16
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.03% 0.058
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String