Wiz Agents & Workflows are here

CVE-2025-40170
Linux Kernel vulnerability analysis and mitigation

Overview

CVE-2025-40170 is a vulnerability discovered in the Linux kernel related to RCU (Read-Copy-Update) protection in network operations. The vulnerability was disclosed on November 12, 2025, affecting various Linux kernel implementations across multiple distributions (NVD).

Technical details

The vulnerability involves improper protection of accesses to dst->dev from sk_setup_caps() and sk_dst_gso_max_size() functions. The issue extends to ip6_dst_mtu_maybe_forward(), ip_dst_mtu_maybe_forward(), and ip4_dst_hoplimit() functions which require proper RCU protection for device access (NVD).

Impact

The vulnerability affects multiple Linux distributions including Ubuntu, Debian, and their derivatives. In Ubuntu, it impacts various kernel versions across different releases including the main kernel, AWS, Azure, and GCP-specific kernels (Ubuntu). In Debian, it affects multiple releases including bullseye, bookworm, and trixie (Debian).

Mitigation and workarounds

The issue has been resolved in newer kernel versions. Debian has fixed the vulnerability in version 6.17.6-1 and later releases (Debian). The fix implements proper RCU protection by using dst_dev_rcu() in the affected functions.

Additional resources


SourceThis report was generated using AI

Related Linux Kernel vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-23395CRITICAL9.1
  • Linux KernelLinux Kernel
  • kernel-rt-64k-debug-devel-matched
NoYesMar 25, 2026
CVE-2026-23399MEDIUM6.5
  • Linux KernelLinux Kernel
  • kernel-rt-64k-debug-devel-matched
NoYesMar 28, 2026
CVE-2026-23398MEDIUM6.5
  • Linux KernelLinux Kernel
  • kernel-abi-stablelists
NoYesMar 26, 2026
CVE-2026-23397MEDIUM4.4
  • Linux KernelLinux Kernel
  • kernel-devel
NoYesMar 26, 2026
CVE-2026-31788N/AN/A
  • Linux KernelLinux Kernel
  • kernel-rt-trace-kvm
NoYesMar 25, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management