{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-38587","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-04-16T04:51:24.026Z","datePublished":"2025-08-19T17:03:08.924Z","dateUpdated":"2026-05-11T21:31:03.983Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T21:31:03.983Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: fix possible infinite loop in fib6_info_uses_dev()\n\nfib6_info_uses_dev() seems to rely on RCU without an explicit\nprotection.\n\nLike the prior fix in rt6_nlmsg_size(),\nwe need to make sure fib6_del_route() or fib6_add_rt2node()\nhave not removed the anchor from the list, or we risk an infinite loop."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["net/ipv6/route.c"],"versions":[{"version":"d0ec61c9f3583b76aebdbb271f5c0d3fcccd48b2","lessThan":"bc85e62394f008fa848c4ba02c936c735a3e8ef5","status":"affected","versionType":"git"},{"version":"52da02521ede55fb86546c3fffd9377b3261b91f","lessThan":"9cb6de8ee144a94ae7a40bdb32560329ab7276f0","status":"affected","versionType":"git"},{"version":"34a949e7a0869dfa31a40416d2a56973fae1807b","lessThan":"db65739d406c72776fbdbbc334be827ef05880d2","status":"affected","versionType":"git"},{"version":"d9ccb18f83ea2bb654289b6ecf014fd267cc988b","lessThan":"16d21816c0918f8058b5fc14cbe8595d62046e2d","status":"affected","versionType":"git"},{"version":"d9ccb18f83ea2bb654289b6ecf014fd267cc988b","lessThan":"e09be457b71b983a085312ff9e981f51e4ed3211","status":"affected","versionType":"git"},{"version":"d9ccb18f83ea2bb654289b6ecf014fd267cc988b","lessThan":"f8d8ce1b515a0a6af72b30502670a406cfb75073","status":"affected","versionType":"git"},{"version":"11edcd026012ac18acee0f1514db3ed1b160fc6f","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["net/ipv6/route.c"],"versions":[{"version":"6.13","status":"affected"},{"version":"0","lessThan":"6.13","status":"unaffected","versionType":"semver"},{"version":"6.1.148","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.6.102","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.12.42","lessThanOrEqual":"6.12.*","status":"unaffected","versionType":"semver"},{"version":"6.15.10","lessThanOrEqual":"6.15.*","status":"unaffected","versionType":"semver"},{"version":"6.16.1","lessThanOrEqual":"6.16.*","status":"unaffected","versionType":"semver"},{"version":"6.17","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.1.128","versionEndExcluding":"6.1.148"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.6.75","versionEndExcluding":"6.6.102"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.12.2","versionEndExcluding":"6.12.42"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.13","versionEndExcluding":"6.15.10"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.13","versionEndExcluding":"6.16.1"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.13","versionEndExcluding":"6.17"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.11.11"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/bc85e62394f008fa848c4ba02c936c735a3e8ef5"},{"url":"https://git.kernel.org/stable/c/9cb6de8ee144a94ae7a40bdb32560329ab7276f0"},{"url":"https://git.kernel.org/stable/c/db65739d406c72776fbdbbc334be827ef05880d2"},{"url":"https://git.kernel.org/stable/c/16d21816c0918f8058b5fc14cbe8595d62046e2d"},{"url":"https://git.kernel.org/stable/c/e09be457b71b983a085312ff9e981f51e4ed3211"},{"url":"https://git.kernel.org/stable/c/f8d8ce1b515a0a6af72b30502670a406cfb75073"}],"title":"ipv6: fix possible infinite loop in fib6_info_uses_dev()","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"title":"CVE Program Container","references":[{"url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-03T17:40:12.598Z"}}]}}