{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T05:27:59.151","vulnerabilities":[{"cve":{"id":"CVE-2025-39978","sourceIdentifier":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","published":"2025-10-15T08:15:35.640","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nocteontx2-pf: Fix potential use after free in otx2_tc_add_flow()\n\nThis code calls kfree_rcu(new_node, rcu) and then dereferences \"new_node\"\nand then dereferences it on the next line.  Two lines later, we take\na mutex so I don't think this is an RCU safe region.  Re-order it to do\nthe dereferences before queuing up the free."}],"metrics":{},"references":[{"url":"https://git.kernel.org/stable/c/5723120423a753a220b8b2954b273838b9d7e74a","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/a8a63f27c3a8a3714210d32b12fd0f16d0337414","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/c41b2941a024d4ec7c768e16ffb10a74b188fced","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/d9c70e93ec5988ab07ad2a92d9f9d12867f02c56","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"},{"url":"https://git.kernel.org/stable/c/df2c071061ed52d2225d97b212d27ecedf456b8a","source":"416baaa9-dc9f-4396-8d5f-8c081fb06d67"}]}}]}