Description
In the Linux kernel, the following vulnerability has been resolved: octeontx2-pf: Fix potential use after free in otx2_tc_add_flow() This code calls kfree_rcu(new_node, rcu) and then dereferences "new_node" and then dereferences it on the next line. Two lines later, we take a mutex so I don't think this is an RCU safe region. Re-order it to do the dereferences before queuing up the free.
Product status
68fbff68dbea35f9e6f7649dd22fce492a5aedac before 5723120423a753a220b8b2954b273838b9d7e74a
68fbff68dbea35f9e6f7649dd22fce492a5aedac before df2c071061ed52d2225d97b212d27ecedf456b8a
68fbff68dbea35f9e6f7649dd22fce492a5aedac before c41b2941a024d4ec7c768e16ffb10a74b188fced
68fbff68dbea35f9e6f7649dd22fce492a5aedac before a8a63f27c3a8a3714210d32b12fd0f16d0337414
68fbff68dbea35f9e6f7649dd22fce492a5aedac before d9c70e93ec5988ab07ad2a92d9f9d12867f02c56
5.14
Any version before 5.14
6.1.155
6.6.109
6.12.50
6.16.10
6.17
References
git.kernel.org/...c/5723120423a753a220b8b2954b273838b9d7e74a
git.kernel.org/...c/df2c071061ed52d2225d97b212d27ecedf456b8a
git.kernel.org/...c/c41b2941a024d4ec7c768e16ffb10a74b188fced
git.kernel.org/...c/a8a63f27c3a8a3714210d32b12fd0f16d0337414
git.kernel.org/...c/d9c70e93ec5988ab07ad2a92d9f9d12867f02c56