Home

Description

In the Linux kernel, the following vulnerability has been resolved: ipv6: use RCU in ip6_output() Use RCU in ip6_output() in order to use dst_dev_rcu() to prevent possible UAF. We can remove rcu_read_lock()/rcu_read_unlock() pairs from ip6_finish_output2().

PUBLISHED Reserved 2025-04-16 | Published 2025-11-12 | Updated 2025-12-01 | Assigner Linux

Product status

Default status
unaffected

4a6ce2b6f2ecabbddcfe47e7cf61dd0f00b10e36 (git) before 0393f85c3241c19ba8550f04a812e7d19f6b3082
affected

4a6ce2b6f2ecabbddcfe47e7cf61dd0f00b10e36 (git) before 11709573cc4e48dc34c80fc7ab9ce5b159e29695
affected

Default status
affected

4.13
affected

Any version before 4.13
unaffected

6.17.3 (semver)
unaffected

6.18 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/0393f85c3241c19ba8550f04a812e7d19f6b3082

git.kernel.org/...c/11709573cc4e48dc34c80fc7ab9ce5b159e29695

cve.org (CVE-2025-40158)

nvd.nist.gov (CVE-2025-40158)

Download JSON