Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-40170

Опубликовано: 12 нояб. 2025
Источник: redhat
CVSS3: 7.4
EPSS Низкий

Описание

In the Linux kernel, the following vulnerability has been resolved: net: use dst_dev_rcu() in sk_setup_caps() Use RCU to protect accesses to dst->dev from sk_setup_caps() and sk_dst_gso_max_size(). Also use dst_dev_rcu() in ip6_dst_mtu_maybe_forward(), and ip_dst_mtu_maybe_forward(). ip4_dst_hoplimit() can use dst_dev_net_rcu().

Отчет

Several paths read dst->dev without RCU. A concurrent dst/device teardown could cause a use-after-free—fixed by switching to dst_dev_rcu() and wrapping sections in rcu_read_lock(), mitigating a local DoS/LPE risk. A local user floods route changes (device up/down, MTU/GSO tweaks, dst churn) while rapidly creating sockets, racing sk_setup_caps() to read dev after free that leads to kernel crash.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6kernelOut of support scope
Red Hat Enterprise Linux 7kernelNot affected
Red Hat Enterprise Linux 7kernel-rtNot affected
Red Hat Enterprise Linux 9kernel-rtAffected
Red Hat Enterprise Linux 10kernelFixedRHSA-2026:169002.02.2026
Red Hat Enterprise Linux 8kernel-rtFixedRHSA-2026:237810.02.2026
Red Hat Enterprise Linux 8kernelFixedRHSA-2026:226409.02.2026
Red Hat Enterprise Linux 9kernelFixedRHSA-2026:221209.02.2026
Red Hat Enterprise Linux 9kernelFixedRHSA-2026:221209.02.2026

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-416
https://bugzilla.redhat.com/show_bug.cgi?id=2414506kernel: net: use dst_dev_rcu() in sk_setup_caps()

EPSS

Процентиль: 9%
0.00032
Низкий

7.4 High

CVSS3

Связанные уязвимости

ubuntu
4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: net: use dst_dev_rcu() in sk_setup_caps() Use RCU to protect accesses to dst->dev from sk_setup_caps() and sk_dst_gso_max_size(). Also use dst_dev_rcu() in ip6_dst_mtu_maybe_forward(), and ip_dst_mtu_maybe_forward(). ip4_dst_hoplimit() can use dst_dev_net_rcu().

nvd
4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: net: use dst_dev_rcu() in sk_setup_caps() Use RCU to protect accesses to dst->dev from sk_setup_caps() and sk_dst_gso_max_size(). Also use dst_dev_rcu() in ip6_dst_mtu_maybe_forward(), and ip_dst_mtu_maybe_forward(). ip4_dst_hoplimit() can use dst_dev_net_rcu().

msrc
4 месяца назад

net: use dst_dev_rcu() in sk_setup_caps()

debian
4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: n ...

github
4 месяца назад

In the Linux kernel, the following vulnerability has been resolved: net: use dst_dev_rcu() in sk_setup_caps() Use RCU to protect accesses to dst->dev from sk_setup_caps() and sk_dst_gso_max_size(). Also use dst_dev_rcu() in ip6_dst_mtu_maybe_forward(), and ip_dst_mtu_maybe_forward(). ip4_dst_hoplimit() can use dst_dev_net_rcu().

EPSS

Процентиль: 9%
0.00032
Низкий

7.4 High

CVSS3