๐Ÿ” CVE Alert

CVE-2025-40168

UNKNOWN 0.0

smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match().

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match(). smc_clc_prfx_match() is called from smc_listen_work() and not under RCU nor RTNL. Using sk_dst_get(sk)->dev could trigger UAF. Let's use __sk_dst_get() and dst_dev_rcu(). Note that the returned value of smc_clc_prfx_match() is not used in the caller.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Nov 12, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
a046d57da19f812216f393e7c535f5858f793ac3 < d26e80f7fb62d77757b67a1b94e4ac756bc9c658 a046d57da19f812216f393e7c535f5858f793ac3 < 235f81045c008169cc4e1955b4a64e118eebe61b
Linux / Linux
4.11

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/d26e80f7fb62d77757b67a1b94e4ac756bc9c658 git.kernel.org: https://git.kernel.org/stable/c/235f81045c008169cc4e1955b4a64e118eebe61b