CVE-2025-39978

Source
https://cve.org/CVERecord?id=CVE-2025-39978
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-39978.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-39978
Downstream
Related
Published
2025-10-15T07:55:58.949Z
Modified
2026-03-12T02:17:03.448191Z
Summary
octeontx2-pf: Fix potential use after free in otx2_tc_add_flow()
Details

In the Linux kernel, the following vulnerability has been resolved:

octeontx2-pf: Fix potential use after free in otx2tcadd_flow()

This code calls kfreercu(newnode, rcu) and then dereferences "new_node" and then dereferences it on the next line. Two lines later, we take a mutex so I don't think this is an RCU safe region. Re-order it to do the dereferences before queuing up the free.

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/39xxx/CVE-2025-39978.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
68fbff68dbea35f9e6f7649dd22fce492a5aedac
Fixed
5723120423a753a220b8b2954b273838b9d7e74a
Fixed
df2c071061ed52d2225d97b212d27ecedf456b8a
Fixed
c41b2941a024d4ec7c768e16ffb10a74b188fced
Fixed
a8a63f27c3a8a3714210d32b12fd0f16d0337414
Fixed
d9c70e93ec5988ab07ad2a92d9f9d12867f02c56

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-39978.json"

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
5.14.0
Fixed
6.1.155
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.109
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.50
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.16.10

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-39978.json"