Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-40074

Опубликовано: 28 окт. 2025
Источник: redhat
CVSS3: 6.4
EPSS Низкий

Описание

In the Linux kernel, the following vulnerability has been resolved: ipv4: start using dst_dev_rcu() Change icmpv4_xrlim_allow(), ip_defrag() to prevent possible UAF. Change ipmr_prepare_xmit(), ipmr_queue_fwd_xmit(), ip_mr_output(), ipv4_neigh_lookup() to use lockdep enabled dst_dev_rcu().

Отчет

The patch replaces non-RCU-safe dst_dev() usages with dst_dev_rcu() and wraps lookups with proper rcu_read_lock(). Without this, concurrency with route/device teardown could yield a dangling dst->dev and a kernel use-after-free, crashing the host. Remote packets can reach these code paths (ICMP, IPv4 defrag, multicast), but a practical trigger typically requires concurrent routing/device changes on the host (admin action), hence for the CVSS the AC:H and most likely DoS-only impact. This issue cannot be reliably triggered by sending crafted packets alone — successful exploitation requires concurrent privileged/server-side actions (e.g. route/interface removal, driver unbind or network-namespace teardown) that change or free the dst->dev while packet processing is underway. A purely unprivileged remote actor cannot force those conditions on a correctly configured system. Triggering this issue in practice typically requires server-side conditions — for example concurrent route/interface changes, netns teardown, or device removal — to occur while packets are being processed. This makes reliable exploitation difficult and confines the risk mainly to DoS. Remote exploitation with a single packet without privileged actions on the host is not expected.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10kernelWill not fix
Red Hat Enterprise Linux 6kernelOut of support scope
Red Hat Enterprise Linux 7kernelNot affected
Red Hat Enterprise Linux 7kernel-rtNot affected
Red Hat Enterprise Linux 8kernelWill not fix
Red Hat Enterprise Linux 8kernel-rtAffected
Red Hat Enterprise Linux 9kernelWill not fix
Red Hat Enterprise Linux 9kernel-rtAffected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-416
https://bugzilla.redhat.com/show_bug.cgi?id=2406739kernel: ipv4: start using dst_dev_rcu()

EPSS

Процентиль: 6%
0.00022
Низкий

6.4 Medium

CVSS3

Связанные уязвимости

ubuntu
5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: ipv4: start using dst_dev_rcu() Change icmpv4_xrlim_allow(), ip_defrag() to prevent possible UAF. Change ipmr_prepare_xmit(), ipmr_queue_fwd_xmit(), ip_mr_output(), ipv4_neigh_lookup() to use lockdep enabled dst_dev_rcu().

nvd
5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: ipv4: start using dst_dev_rcu() Change icmpv4_xrlim_allow(), ip_defrag() to prevent possible UAF. Change ipmr_prepare_xmit(), ipmr_queue_fwd_xmit(), ip_mr_output(), ipv4_neigh_lookup() to use lockdep enabled dst_dev_rcu().

msrc
4 месяца назад

ipv4: start using dst_dev_rcu()

debian
5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: i ...

github
5 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: ipv4: start using dst_dev_rcu() Change icmpv4_xrlim_allow(), ip_defrag() to prevent possible UAF. Change ipmr_prepare_xmit(), ipmr_queue_fwd_xmit(), ip_mr_output(), ipv4_neigh_lookup() to use lockdep enabled dst_dev_rcu().

EPSS

Процентиль: 6%
0.00022
Низкий

6.4 Medium

CVSS3