CVE-2025-38587

In the Linux kernel, the following vulnerability has been resolved: ipv6: fix possible infinite loop in fib6_info_uses_dev() fib6_info_uses_dev() seems to rely on RCU without an explicit protection. Like the prior fix in rt6_nlmsg_size(), we need to make sure fib6_del_route() or fib6_add_rt2node() have not removed the anchor from the list, or we risk an infinite loop.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

07 Jan 2026, 18:45

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/16d21816c0918f8058b5fc14cbe8595d62046e2d - () https://git.kernel.org/stable/c/16d21816c0918f8058b5fc14cbe8595d62046e2d - Patch
References () https://git.kernel.org/stable/c/9cb6de8ee144a94ae7a40bdb32560329ab7276f0 - () https://git.kernel.org/stable/c/9cb6de8ee144a94ae7a40bdb32560329ab7276f0 - Patch
References () https://git.kernel.org/stable/c/bc85e62394f008fa848c4ba02c936c735a3e8ef5 - () https://git.kernel.org/stable/c/bc85e62394f008fa848c4ba02c936c735a3e8ef5 - Patch
References () https://git.kernel.org/stable/c/db65739d406c72776fbdbbc334be827ef05880d2 - () https://git.kernel.org/stable/c/db65739d406c72776fbdbbc334be827ef05880d2 - Patch
References () https://git.kernel.org/stable/c/e09be457b71b983a085312ff9e981f51e4ed3211 - () https://git.kernel.org/stable/c/e09be457b71b983a085312ff9e981f51e4ed3211 - Patch
References () https://git.kernel.org/stable/c/f8d8ce1b515a0a6af72b30502670a406cfb75073 - () https://git.kernel.org/stable/c/f8d8ce1b515a0a6af72b30502670a406cfb75073 - Patch
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory
CWE CWE-835
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel

03 Nov 2025, 18:16

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html -

20 Aug 2025, 14:40

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ipv6: corrección de un posible bucle infinito en fib6_info_uses_dev(). fib6_info_uses_dev() parece depender de RCU sin protección explícita. Al igual que la corrección anterior en rt6_nlmsg_size(), debemos asegurarnos de que fib6_del_route() o fib6_add_rt2node() no hayan eliminado el ancla de la lista; de lo contrario, corremos el riesgo de un bucle infinito.

19 Aug 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-19 17:15

Updated : 2026-01-07 18:45


NVD link : CVE-2025-38587

Mitre link : CVE-2025-38587

CVE.ORG link : CVE-2025-38587


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-835

Loop with Unreachable Exit Condition ('Infinite Loop')