In the Linux kernel, the following vulnerability has been resolved: net: sched: Fix use after free in red_enqueue() We can't use "skb" again after passing it to qdisc_enqueue(). This is basically identical to commit 2f09707d0c97 ("sch_sfb: Also store skb len before calling child enqueue").
Upstream advisory: https://lore.kernel.org/linux-cve-announce/2025050108-CVE-2022-49921-e4fc@gregkh/T