CVE-2025-40170
BaseFortify
Publication date: 2025-11-12
Last updated on: 2025-11-12
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel involves improper handling of device pointers (dst->dev) in network-related functions such as sk_setup_caps() and sk_dst_gso_max_size(). The fix uses Read-Copy-Update (RCU) mechanisms to protect these accesses, preventing potential race conditions or use-after-free errors when accessing network device structures.
How can this vulnerability impact me? :
If exploited, this vulnerability could lead to kernel instability or crashes due to improper synchronization when accessing network device data. This might allow attackers to cause denial of service or potentially escalate privileges by exploiting race conditions in the kernel networking code.