CVE-2025-39978
BaseFortify
Publication date: 2025-10-15
Last updated on: 2025-10-16
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a use-after-free issue in the Linux kernel's octeontx2-pf driver, specifically in the function otx2_tc_add_flow(). The code frees a memory node (new_node) using kfree_rcu and then dereferences it immediately afterward, which can lead to accessing freed memory. The fix involves reordering the code to perform dereferences before freeing the memory to avoid unsafe access.
How can this vulnerability impact me? :
The use-after-free vulnerability can lead to undefined behavior such as system crashes, data corruption, or potential escalation of privileges if exploited. It may compromise system stability and security by allowing attackers to manipulate kernel memory improperly.