octeontx2-pf: Fix potential use after free in otx2_tc_add_flow()
CVE-2025-39978

Currently unrated

Key Information:

Vendor

Linux

Status
Vendor
CVE Published:
15 October 2025

What is CVE-2025-39978?

In the Linux kernel, the following vulnerability has been resolved:

octeontx2-pf: Fix potential use after free in otx2_tc_add_flow()

This code calls kfree_rcu(new_node, rcu) and then dereferences "new_node" and then dereferences it on the next line. Two lines later, we take a mutex so I don't think this is an RCU safe region. Re-order it to do the dereferences before queuing up the free.

Affected Version(s)

Linux 68fbff68dbea35f9e6f7649dd22fce492a5aedac < 5723120423a753a220b8b2954b273838b9d7e74a

Linux 68fbff68dbea35f9e6f7649dd22fce492a5aedac

Linux 68fbff68dbea35f9e6f7649dd22fce492a5aedac

References

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2025-39978 : Use After Free Vulnerability in Linux Kernel's OcteonTX2-PF