In the Linux kernel, the following vulnerability has been resolved: net/sched: fix use-after-free in taprio_dev_notifier Since taprio’s taprio_dev_notifier() isn’t protected by an RCU read-side critical section, a race with advance_sched() can lead to a use-after-free. Adding rcu_read_lock() inside taprio_dev_notifier() prevents this.
Upstream advisory: https://lore.kernel.org/linux-cve-announce/2025063052-CVE-2025-38087-cd0f@gregkh/T
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.4 Extended Update Support Via RHSA-2025:11810 https://access.redhat.com/errata/RHSA-2025:11810
This issue has been addressed in the following products: Red Hat Enterprise Linux 10 Via RHSA-2025:12662 https://access.redhat.com/errata/RHSA-2025:12662
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2025:12746 https://access.redhat.com/errata/RHSA-2025:12746