-
CVE-2025-39978
- EPSS 0.04%
- Veröffentlicht 15.10.2025 07:55:58
- Zuletzt bearbeitet 16.10.2025 15:29:11
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
In the Linux kernel, the following vulnerability has been resolved: octeontx2-pf: Fix potential use after free in otx2_tc_add_flow() This code calls kfree_rcu(new_node, rcu) and then dereferences "new_node" and then dereferences it on the next line. Two lines later, we take a mutex so I don't think this is an RCU safe region. Re-order it to do the dereferences before queuing up the free.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
5723120423a753a220b8b2954b273838b9d7e74a
Version
68fbff68dbea35f9e6f7649dd22fce492a5aedac
Status
affected
Version <
df2c071061ed52d2225d97b212d27ecedf456b8a
Version
68fbff68dbea35f9e6f7649dd22fce492a5aedac
Status
affected
Version <
c41b2941a024d4ec7c768e16ffb10a74b188fced
Version
68fbff68dbea35f9e6f7649dd22fce492a5aedac
Status
affected
Version <
a8a63f27c3a8a3714210d32b12fd0f16d0337414
Version
68fbff68dbea35f9e6f7649dd22fce492a5aedac
Status
affected
Version <
d9c70e93ec5988ab07ad2a92d9f9d12867f02c56
Version
68fbff68dbea35f9e6f7649dd22fce492a5aedac
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
5.14
Status
affected
Version <
5.14
Version
0
Status
unaffected
Version <=
6.1.*
Version
6.1.155
Status
unaffected
Version <=
6.6.*
Version
6.6.109
Status
unaffected
Version <=
6.12.*
Version
6.12.50
Status
unaffected
Version <=
6.16.*
Version
6.16.10
Status
unaffected
Version <=
*
Version
6.17
Status
unaffected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.04% | 0.108 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|