-

CVE-2025-39978

In the Linux kernel, the following vulnerability has been resolved:

octeontx2-pf: Fix potential use after free in otx2_tc_add_flow()

This code calls kfree_rcu(new_node, rcu) and then dereferences "new_node"
and then dereferences it on the next line.  Two lines later, we take
a mutex so I don't think this is an RCU safe region.  Re-order it to do
the dereferences before queuing up the free.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 5723120423a753a220b8b2954b273838b9d7e74a
Version 68fbff68dbea35f9e6f7649dd22fce492a5aedac
Status affected
Version < df2c071061ed52d2225d97b212d27ecedf456b8a
Version 68fbff68dbea35f9e6f7649dd22fce492a5aedac
Status affected
Version < c41b2941a024d4ec7c768e16ffb10a74b188fced
Version 68fbff68dbea35f9e6f7649dd22fce492a5aedac
Status affected
Version < a8a63f27c3a8a3714210d32b12fd0f16d0337414
Version 68fbff68dbea35f9e6f7649dd22fce492a5aedac
Status affected
Version < d9c70e93ec5988ab07ad2a92d9f9d12867f02c56
Version 68fbff68dbea35f9e6f7649dd22fce492a5aedac
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 5.14
Status affected
Version < 5.14
Version 0
Status unaffected
Version <= 6.1.*
Version 6.1.155
Status unaffected
Version <= 6.6.*
Version 6.6.109
Status unaffected
Version <= 6.12.*
Version 6.12.50
Status unaffected
Version <= 6.16.*
Version 6.16.10
Status unaffected
Version <= *
Version 6.17
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.04% 0.108
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String