Home

Description

In the Linux kernel, the following vulnerability has been resolved: octeontx2-pf: Fix potential use after free in otx2_tc_add_flow() This code calls kfree_rcu(new_node, rcu) and then dereferences "new_node" and then dereferences it on the next line. Two lines later, we take a mutex so I don't think this is an RCU safe region. Re-order it to do the dereferences before queuing up the free.

PUBLISHED Reserved 2025-04-16 | Published 2025-10-15 | Updated 2025-10-15 | Assigner Linux

Product status

Default status
unaffected

68fbff68dbea35f9e6f7649dd22fce492a5aedac before 5723120423a753a220b8b2954b273838b9d7e74a
affected

68fbff68dbea35f9e6f7649dd22fce492a5aedac before df2c071061ed52d2225d97b212d27ecedf456b8a
affected

68fbff68dbea35f9e6f7649dd22fce492a5aedac before c41b2941a024d4ec7c768e16ffb10a74b188fced
affected

68fbff68dbea35f9e6f7649dd22fce492a5aedac before a8a63f27c3a8a3714210d32b12fd0f16d0337414
affected

68fbff68dbea35f9e6f7649dd22fce492a5aedac before d9c70e93ec5988ab07ad2a92d9f9d12867f02c56
affected

Default status
affected

5.14
affected

Any version before 5.14
unaffected

6.1.155
unaffected

6.6.109
unaffected

6.12.50
unaffected

6.16.10
unaffected

6.17
unaffected

References

git.kernel.org/...c/5723120423a753a220b8b2954b273838b9d7e74a

git.kernel.org/...c/df2c071061ed52d2225d97b212d27ecedf456b8a

git.kernel.org/...c/c41b2941a024d4ec7c768e16ffb10a74b188fced

git.kernel.org/...c/a8a63f27c3a8a3714210d32b12fd0f16d0337414

git.kernel.org/...c/d9c70e93ec5988ab07ad2a92d9f9d12867f02c56

cve.org (CVE-2025-39978)

nvd.nist.gov (CVE-2025-39978)

Download JSON