Home

Description

In the Linux kernel, the following vulnerability has been resolved: tls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock(). get_netdev_for_sock() is called during setsockopt(), so not under RCU. Using sk_dst_get(sk)->dev could trigger UAF. Let's use __sk_dst_get() and dst_dev_rcu(). Note that the only ->ndo_sk_get_lower_dev() user is bond_sk_get_lower_dev(), which uses RCU.

PUBLISHED Reserved 2025-04-16 | Published 2025-11-12 | Updated 2025-12-01 | Assigner Linux

Product status

Default status
unaffected

e8f69799810c32dd40c6724d829eccc70baad07f (git) before feb474ddbf26b51f462ae2e60a12013bdcfc5407
affected

e8f69799810c32dd40c6724d829eccc70baad07f (git) before c65f27b9c3be2269918e1cbad6d8884741f835c5
affected

Default status
affected

4.18
affected

Any version before 4.18
unaffected

6.17.3 (semver)
unaffected

6.18 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/feb474ddbf26b51f462ae2e60a12013bdcfc5407

git.kernel.org/...c/c65f27b9c3be2269918e1cbad6d8884741f835c5

cve.org (CVE-2025-40149)

nvd.nist.gov (CVE-2025-40149)

Download JSON