Acknowledged
Created: Oct 15, 2025
Updated: Oct 17, 2025
Found In Version: 10.24.33.1
Severity: Standard
Applicable for: Wind River Linux LTS 24
Component/s: Kernel
In the Linux kernel, the following vulnerability has been resolved:[EOL][EOL]octeontx2-pf: Fix potential use after free in otx2_tc_add_flow()[EOL][EOL]This code calls kfree_rcu(new_node, rcu) and then dereferences "new_node"[EOL]and then dereferences it on the next line. Two lines later, we take[EOL]a mutex so I don't think this is an RCU safe region. Re-order it to do[EOL]the dereferences before queuing up the free.