CVE-2025-38587
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
19/08/2025
Last modified:
07/01/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
ipv6: fix possible infinite loop in fib6_info_uses_dev()<br />
<br />
fib6_info_uses_dev() seems to rely on RCU without an explicit<br />
protection.<br />
<br />
Like the prior fix in rt6_nlmsg_size(),<br />
we need to make sure fib6_del_route() or fib6_add_rt2node()<br />
have not removed the anchor from the list, or we risk an infinite loop.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.1.128 (including) | 6.1.148 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.6.75 (including) | 6.6.102 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.11.11 (including) | 6.12 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.12.2 (including) | 6.12.42 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.15.10 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.16 (including) | 6.16.1 (excluding) |
| cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/16d21816c0918f8058b5fc14cbe8595d62046e2d
- https://git.kernel.org/stable/c/9cb6de8ee144a94ae7a40bdb32560329ab7276f0
- https://git.kernel.org/stable/c/bc85e62394f008fa848c4ba02c936c735a3e8ef5
- https://git.kernel.org/stable/c/db65739d406c72776fbdbbc334be827ef05880d2
- https://git.kernel.org/stable/c/e09be457b71b983a085312ff9e981f51e4ed3211
- https://git.kernel.org/stable/c/f8d8ce1b515a0a6af72b30502670a406cfb75073
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html



