CVE-2025-40074
ipv4: start using dst_dev_rcu()
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: ipv4: start using dst_dev_rcu() Change icmpv4_xrlim_allow(), ip_defrag() to prevent possible UAF. Change ipmr_prepare_xmit(), ipmr_queue_fwd_xmit(), ip_mr_output(), ipv4_neigh_lookup() to use lockdep enabled dst_dev_rcu().
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Oct 28, 2025 |
| Last Updated | May 11, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new unknown vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
4a6ce2b6f2ecabbddcfe47e7cf61dd0f00b10e36 < 923e0734c386984d45de508528a7a7ad91d791cc 4a6ce2b6f2ecabbddcfe47e7cf61dd0f00b10e36 < 6ad8de3cefdb6ffa6708b21c567df0dbf82c43a8
Linux / Linux
4.13