Home

Description

In the Linux kernel, the following vulnerability has been resolved: tcp: use dst_dev_rcu() in tcp_fastopen_active_disable_ofo_check() Use RCU to avoid a pair of atomic operations and a potential UAF on dst_dev()->flags.

PUBLISHED Reserved 2025-12-16 | Published 2025-12-16 | Updated 2025-12-16 | Assigner Linux

Product status

Default status
unaffected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before bc2b881a0896c111c1041d8bb1f92a3b3873ace5
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 06da08d9355bf8e2070459bbedbe372ccc02cc0e
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before b62a59c18b692f892dcb8109c1c2e653b2abc95c
affected

Default status
affected

6.12.58 (semver)
unaffected

6.17.8 (semver)
unaffected

6.18 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/bc2b881a0896c111c1041d8bb1f92a3b3873ace5

git.kernel.org/...c/06da08d9355bf8e2070459bbedbe372ccc02cc0e

git.kernel.org/...c/b62a59c18b692f892dcb8109c1c2e653b2abc95c

cve.org (CVE-2025-68188)

nvd.nist.gov (CVE-2025-68188)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.