CVE-2025-38310

In the Linux kernel, the following vulnerability has been resolved: seg6: Fix validation of nexthop addresses The kernel currently validates that the length of the provided nexthop address does not exceed the specified length. This can lead to the kernel reading uninitialized memory if user space provided a shorter length than the specified one. Fix by validating that the provided length exactly matches the specified one.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

19 Dec 2025, 17:58

Type Values Removed Values Added
CWE NVD-CWE-noinfo
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/668923c474608dd9ebce0fbcc41bd8a27aa73dd6 - () https://git.kernel.org/stable/c/668923c474608dd9ebce0fbcc41bd8a27aa73dd6 - Patch
References () https://git.kernel.org/stable/c/7632fedb266d93ed0ed9f487133e6c6314a9b2d1 - () https://git.kernel.org/stable/c/7632fedb266d93ed0ed9f487133e6c6314a9b2d1 - Patch
References () https://git.kernel.org/stable/c/cd4cd09810211fa23609c5c1018352e9e1cd8e5a - () https://git.kernel.org/stable/c/cd4cd09810211fa23609c5c1018352e9e1cd8e5a - Patch
References () https://git.kernel.org/stable/c/cef33a86bcb04ecf4dc10c56f6c42ee9d1c54bac - () https://git.kernel.org/stable/c/cef33a86bcb04ecf4dc10c56f6c42ee9d1c54bac - Patch
References () https://git.kernel.org/stable/c/d2507aeea45b3c5aa24d5daae0cf3db76895c0b7 - () https://git.kernel.org/stable/c/d2507aeea45b3c5aa24d5daae0cf3db76895c0b7 - Patch
References () https://git.kernel.org/stable/c/d5d9fd13bc19a3f9f2a951c5b6e934d84205789e - () https://git.kernel.org/stable/c/d5d9fd13bc19a3f9f2a951c5b6e934d84205789e - Patch
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory
CPE cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel

03 Nov 2025, 18:16

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html -

10 Jul 2025, 13:17

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: seg6: Se corrige la validación de direcciones de siguiente salto. El kernel actualmente valida que la longitud de la dirección de siguiente salto proporcionada no supere la longitud especificada. Esto puede provocar que el kernel lea memoria no inicializada si el espacio de usuario proporcionó una longitud menor que la especificada. Se corrige validando que la longitud proporcionada coincida exactamente con la especificada.

10 Jul 2025, 08:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-10 08:15

Updated : 2025-12-19 17:58


NVD link : CVE-2025-38310

Mitre link : CVE-2025-38310

CVE.ORG link : CVE-2025-38310


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel