{"id":"CVE-2025-38087","summary":"net/sched: fix use-after-free in taprio_dev_notifier","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: fix use-after-free in taprio_dev_notifier\n\nSince taprio’s taprio_dev_notifier() isn’t protected by an\nRCU read-side critical section, a race with advance_sched()\ncan lead to a use-after-free.\n\nAdding rcu_read_lock() inside taprio_dev_notifier() prevents this.","modified":"2026-04-02T12:47:47.544799Z","published":"2025-06-30T07:29:43.325Z","related":["ALSA-2025:12662","ALSA-2025:12746","MGASA-2025-0218","MGASA-2025-0219","SUSE-SU-2025:02853-1","SUSE-SU-2025:02923-1","SUSE-SU-2025:02969-1","SUSE-SU-2025:02996-1","SUSE-SU-2025:02997-1","SUSE-SU-2025:03011-1","SUSE-SU-2025:03023-1","SUSE-SU-2025:03097-1","SUSE-SU-2025:03100-1","SUSE-SU-2025:03104-1","SUSE-SU-2025:03106-1","SUSE-SU-2025:03108-1","SUSE-SU-2025:03109-1","SUSE-SU-2025:03111-1","SUSE-SU-2025:03123-1","SUSE-SU-2025:03209-1","SUSE-SU-2025:03210-1","SUSE-SU-2025:03212-1","SUSE-SU-2025:03213-1","SUSE-SU-2025:03215-1","SUSE-SU-2025:03217-1","SUSE-SU-2025:03222-1","SUSE-SU-2025:03223-1","SUSE-SU-2025:03226-1","SUSE-SU-2025:03235-1","SUSE-SU-2025:20577-1","SUSE-SU-2025:20586-1","SUSE-SU-2025:20601-1","SUSE-SU-2025:20602-1","SUSE-SU-2025:20698-1","SUSE-SU-2025:20699-1","SUSE-SU-2025:20700-1","SUSE-SU-2025:20701-1","SUSE-SU-2025:20702-1","SUSE-SU-2025:20703-1","SUSE-SU-2025:20704-1","SUSE-SU-2025:20705-1","SUSE-SU-2025:20706-1","SUSE-SU-2025:20707-1","SUSE-SU-2025:20709-1","SUSE-SU-2025:20710-1","SUSE-SU-2025:20711-1","SUSE-SU-2025:20712-1","SUSE-SU-2025:20714-1","SUSE-SU-2025:20761-1","SUSE-SU-2025:20762-1","SUSE-SU-2025:20763-1","SUSE-SU-2025:20764-1","SUSE-SU-2025:20766-1","SUSE-SU-2025:20767-1","SUSE-SU-2025:20775-1","SUSE-SU-2025:20776-1","SUSE-SU-2025:20777-1","SUSE-SU-2025:20778-1","SUSE-SU-2025:20779-1","SUSE-SU-2025:20780-1","SUSE-SU-2025:20782-1","SUSE-SU-2025:21074-1","SUSE-SU-2025:21139-1","SUSE-SU-2025:21179-1","openSUSE-SU-2025:20081-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38087.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/8a008c89e5e5c5332e4c0a33d707db9ddd529f8a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8c5713ce1ced75f9e9ed5c642ea3d2ba06ead69c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b1547d28ba468bc3b88764efd13e4319bab63be8"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b160766e26d4e2e2d6fe2294e0b02f92baefcec5"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38087.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-38087"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"fed87cc6718ad5f80aa739fee3c5979a8b09d3a6"},{"fixed":"8c5713ce1ced75f9e9ed5c642ea3d2ba06ead69c"},{"fixed":"8a008c89e5e5c5332e4c0a33d707db9ddd529f8a"},{"fixed":"b1547d28ba468bc3b88764efd13e4319bab63be8"},{"fixed":"b160766e26d4e2e2d6fe2294e0b02f92baefcec5"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-38087.json"}}],"schema_version":"1.7.5"}