In the Linux kernel, the following vulnerability has been resolved:
octeontx2-pf: Fix potential use after free in otx2tcadd_flow()
This code calls kfreercu(newnode, rcu) and then dereferences "new_node" and then dereferences it on the next line. Two lines later, we take a mutex so I don't think this is an RCU safe region. Re-order it to do the dereferences before queuing up the free.
{
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/39xxx/CVE-2025-39978.json",
"cna_assigner": "Linux"
}