vulnerability
Ubuntu: (CVE-2025-39978): linux vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 6 | (AV:L/AC:L/Au:S/C:C/I:N/A:C) | Oct 15, 2025 | Oct 30, 2025 | Nov 4, 2025 |
Severity
6
CVSS
(AV:L/AC:L/Au:S/C:C/I:N/A:C)
Published
Oct 15, 2025
Added
Oct 30, 2025
Modified
Nov 4, 2025
Description
In the Linux kernel, the following vulnerability has been resolved: octeontx2-pf: Fix potential use after free in otx2_tc_add_flow() This code calls kfree_rcu(new_node, rcu) and then dereferences "new_node" and then dereferences it on the next line. Two lines later, we take a mutex so I don't think this is an RCU safe region. Re-order it to do the dereferences before queuing up the free.
Solutions
ubuntu-upgrade-linuxubuntu-upgrade-linux-awsubuntu-upgrade-linux-azureubuntu-upgrade-linux-gcpubuntu-upgrade-linux-oracleubuntu-upgrade-linux-raspiubuntu-upgrade-linux-realtimeubuntu-upgrade-linux-riscv
References
- CVE-2025-39978
- https://attackerkb.com/topics/CVE-2025-39978
- URL-https://git.kernel.org/linus/d9c70e93ec5988ab07ad2a92d9f9d12867f02c56
- URL-https://git.kernel.org/stable/c/5723120423a753a220b8b2954b273838b9d7e74a
- URL-https://git.kernel.org/stable/c/a8a63f27c3a8a3714210d32b12fd0f16d0337414
- URL-https://git.kernel.org/stable/c/c41b2941a024d4ec7c768e16ffb10a74b188fced
- URL-https://git.kernel.org/stable/c/d9c70e93ec5988ab07ad2a92d9f9d12867f02c56
- URL-https://git.kernel.org/stable/c/df2c071061ed52d2225d97b212d27ecedf456b8a
- URL-https://www.cve.org/CVERecord?id=CVE-2025-39978
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.