In the Linux kernel, the following vulnerability has been resolved: net: use dst_dev_rcu() in sk_setup_caps() Use RCU to protect accesses to dst->dev from sk_setup_caps() and sk_dst_gso_max_size(). Also use dst_dev_rcu() in ip6_dst_mtu_maybe_forward(), and ip_dst_mtu_maybe_forward(). ip4_dst_hoplimit() can use dst_dev_net_rcu().
Upstream advisory: https://lore.kernel.org/linux-cve-announce/2025111259-CVE-2025-40170-d39d@gregkh/T
This issue has been addressed in the following products: Red Hat Enterprise Linux 10 Via RHSA-2026:1690 https://access.redhat.com/errata/RHSA-2026:1690
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2026:2212 https://access.redhat.com/errata/RHSA-2026:2212
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2026:2264 https://access.redhat.com/errata/RHSA-2026:2264
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2026:2378 https://access.redhat.com/errata/RHSA-2026:2378