Home

Description

In the Linux kernel, the following vulnerability has been resolved: net: use dst_dev_rcu() in sk_setup_caps() Use RCU to protect accesses to dst->dev from sk_setup_caps() and sk_dst_gso_max_size(). Also use dst_dev_rcu() in ip6_dst_mtu_maybe_forward(), and ip_dst_mtu_maybe_forward(). ip4_dst_hoplimit() can use dst_dev_net_rcu().

PUBLISHED Reserved 2025-04-16 | Published 2025-11-12 | Updated 2025-12-01 | Assigner Linux

Product status

Default status
unaffected

4a6ce2b6f2ecabbddcfe47e7cf61dd0f00b10e36 (git) before a805729c0091073d8f0415cfa96c7acd1bc17a48
affected

4a6ce2b6f2ecabbddcfe47e7cf61dd0f00b10e36 (git) before 99a2ace61b211b0be861b07fbaa062fca4b58879
affected

Default status
affected

4.13
affected

Any version before 4.13
unaffected

6.17.3 (semver)
unaffected

6.18 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/a805729c0091073d8f0415cfa96c7acd1bc17a48

git.kernel.org/...c/99a2ace61b211b0be861b07fbaa062fca4b58879

cve.org (CVE-2025-40170)

nvd.nist.gov (CVE-2025-40170)

Download JSON