CVE-2025-39978
octeontx2-pf: Fix potential use after free in otx2_tc_add_flow()
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: octeontx2-pf: Fix potential use after free in otx2_tc_add_flow() This code calls kfree_rcu(new_node, rcu) and then dereferences "new_node" and then dereferences it on the next line. Two lines later, we take a mutex so I don't think this is an RCU safe region. Re-order it to do the dereferences before queuing up the free.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Oct 15, 2025 |
| Last Updated | May 11, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new unknown vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
68fbff68dbea35f9e6f7649dd22fce492a5aedac < 5723120423a753a220b8b2954b273838b9d7e74a 68fbff68dbea35f9e6f7649dd22fce492a5aedac < df2c071061ed52d2225d97b212d27ecedf456b8a 68fbff68dbea35f9e6f7649dd22fce492a5aedac < c41b2941a024d4ec7c768e16ffb10a74b188fced 68fbff68dbea35f9e6f7649dd22fce492a5aedac < a8a63f27c3a8a3714210d32b12fd0f16d0337414 68fbff68dbea35f9e6f7649dd22fce492a5aedac < d9c70e93ec5988ab07ad2a92d9f9d12867f02c56
Linux / Linux
5.14
References
git.kernel.org: https://git.kernel.org/stable/c/5723120423a753a220b8b2954b273838b9d7e74a git.kernel.org: https://git.kernel.org/stable/c/df2c071061ed52d2225d97b212d27ecedf456b8a git.kernel.org: https://git.kernel.org/stable/c/c41b2941a024d4ec7c768e16ffb10a74b188fced git.kernel.org: https://git.kernel.org/stable/c/a8a63f27c3a8a3714210d32b12fd0f16d0337414 git.kernel.org: https://git.kernel.org/stable/c/d9c70e93ec5988ab07ad2a92d9f9d12867f02c56