Home

Description

In the Linux kernel, the following vulnerability has been resolved: smc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set(). smc_clc_prfx_set() is called during connect() and not under RCU nor RTNL. Using sk_dst_get(sk)->dev could trigger UAF. Let's use __sk_dst_get() and dev_dst_rcu() under rcu_read_lock() after kernel_getsockname(). Note that the returned value of smc_clc_prfx_set() is not used in the caller. While at it, we change the 1st arg of smc_clc_prfx_set[46]_rcu() not to touch dst there.

PUBLISHED Reserved 2025-04-16 | Published 2025-11-12 | Updated 2025-12-01 | Assigner Linux

Product status

Default status
unaffected

a046d57da19f812216f393e7c535f5858f793ac3 (git) before 0736993bfe5c7a9c744ae3fac62d769dfdae54e1
affected

a046d57da19f812216f393e7c535f5858f793ac3 (git) before 935d783e5de9b64587f3adb25641dd8385e64ddb
affected

Default status
affected

4.11
affected

Any version before 4.11
unaffected

6.17.3 (semver)
unaffected

6.18 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/0736993bfe5c7a9c744ae3fac62d769dfdae54e1

git.kernel.org/...c/935d783e5de9b64587f3adb25641dd8385e64ddb

cve.org (CVE-2025-40139)

nvd.nist.gov (CVE-2025-40139)

Download JSON