{"uuid": "b59bc96c-6de3-4006-a050-fd4000ee6b60", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-38087", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/19910", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-38087\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: fix use-after-free in taprio_dev_notifier\n\nSince taprio\u2019s taprio_dev_notifier() isn\u2019t protected by an\nRCU read-side critical section, a race with advance_sched()\ncan lead to a use-after-free.\n\nAdding rcu_read_lock() inside taprio_dev_notifier() prevents this.\n\ud83d\udccf Published: 2025-06-30T07:29:43.325Z\n\ud83d\udccf Modified: 2025-06-30T07:29:43.325Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/8c5713ce1ced75f9e9ed5c642ea3d2ba06ead69c\n2. https://git.kernel.org/stable/c/8a008c89e5e5c5332e4c0a33d707db9ddd529f8a\n3. https://git.kernel.org/stable/c/b1547d28ba468bc3b88764efd13e4319bab63be8\n4. https://git.kernel.org/stable/c/b160766e26d4e2e2d6fe2294e0b02f92baefcec5", "creation_timestamp": "2025-06-30T07:56:17.000000Z"}