Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2025-39978

Опубликовано: 16 окт. 2025
Источник: msrc
CVSS3: 9.8
EPSS Низкий

Описание

octeontx2-pf: Fix potential use after free in otx2_tc_add_flow()

EPSS

Процентиль: 5%
0.00024
Низкий

9.8 Critical

CVSS3

Связанные уязвимости

ubuntu
26 дней назад

In the Linux kernel, the following vulnerability has been resolved: octeontx2-pf: Fix potential use after free in otx2_tc_add_flow() This code calls kfree_rcu(new_node, rcu) and then dereferences "new_node" and then dereferences it on the next line. Two lines later, we take a mutex so I don't think this is an RCU safe region. Re-order it to do the dereferences before queuing up the free.

nvd
26 дней назад

In the Linux kernel, the following vulnerability has been resolved: octeontx2-pf: Fix potential use after free in otx2_tc_add_flow() This code calls kfree_rcu(new_node, rcu) and then dereferences "new_node" and then dereferences it on the next line. Two lines later, we take a mutex so I don't think this is an RCU safe region. Re-order it to do the dereferences before queuing up the free.

debian
26 дней назад

In the Linux kernel, the following vulnerability has been resolved: o ...

github
26 дней назад

In the Linux kernel, the following vulnerability has been resolved: octeontx2-pf: Fix potential use after free in otx2_tc_add_flow() This code calls kfree_rcu(new_node, rcu) and then dereferences "new_node" and then dereferences it on the next line. Two lines later, we take a mutex so I don't think this is an RCU safe region. Re-order it to do the dereferences before queuing up the free.

EPSS

Процентиль: 5%
0.00024
Низкий

9.8 Critical

CVSS3