{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-38588","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-04-16T04:51:24.026Z","datePublished":"2025-08-19T17:03:09.856Z","dateUpdated":"2026-05-11T21:31:05.116Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T21:31:05.116Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: prevent infinite loop in rt6_nlmsg_size()\n\nWhile testing prior patch, I was able to trigger\nan infinite loop in rt6_nlmsg_size() in the following place:\n\nlist_for_each_entry_rcu(sibling, &f6i->fib6_siblings,\n\t\t\tfib6_siblings) {\n\trt6_nh_nlmsg_size(sibling->fib6_nh, &nexthop_len);\n}\n\nThis is because fib6_del_route() and fib6_add_rt2node()\nuses list_del_rcu(), which can confuse rcu readers,\nbecause they might no longer see the head of the list.\n\nRestart the loop if f6i->fib6_nsiblings is zero."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["net/ipv6/ip6_fib.c","net/ipv6/route.c"],"versions":[{"version":"d0ec61c9f3583b76aebdbb271f5c0d3fcccd48b2","lessThan":"6d345136c9b875f065d226908a29c25cdf9343f8","status":"affected","versionType":"git"},{"version":"52da02521ede55fb86546c3fffd9377b3261b91f","lessThan":"e1b7932af47f92432be8303d2439d1bf77b0be23","status":"affected","versionType":"git"},{"version":"34a949e7a0869dfa31a40416d2a56973fae1807b","lessThan":"cd8d8bbd9ced4cc5d06d858f67d4aa87745e8f38","status":"affected","versionType":"git"},{"version":"d9ccb18f83ea2bb654289b6ecf014fd267cc988b","lessThan":"3c13db3e47e170bab19e574404e7b6be45ea873d","status":"affected","versionType":"git"},{"version":"d9ccb18f83ea2bb654289b6ecf014fd267cc988b","lessThan":"46aeb66e9e54ed0d56c18615e1c3dbd502b327ab","status":"affected","versionType":"git"},{"version":"d9ccb18f83ea2bb654289b6ecf014fd267cc988b","lessThan":"54e6fe9dd3b0e7c481c2228782c9494d653546da","status":"affected","versionType":"git"},{"version":"11edcd026012ac18acee0f1514db3ed1b160fc6f","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["net/ipv6/ip6_fib.c","net/ipv6/route.c"],"versions":[{"version":"6.13","status":"affected"},{"version":"0","lessThan":"6.13","status":"unaffected","versionType":"semver"},{"version":"6.1.148","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.6.102","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.12.42","lessThanOrEqual":"6.12.*","status":"unaffected","versionType":"semver"},{"version":"6.15.10","lessThanOrEqual":"6.15.*","status":"unaffected","versionType":"semver"},{"version":"6.16.1","lessThanOrEqual":"6.16.*","status":"unaffected","versionType":"semver"},{"version":"6.17","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.1.128","versionEndExcluding":"6.1.148"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.6.75","versionEndExcluding":"6.6.102"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.12.2","versionEndExcluding":"6.12.42"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.13","versionEndExcluding":"6.15.10"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.13","versionEndExcluding":"6.16.1"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.13","versionEndExcluding":"6.17"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"6.11.11"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/6d345136c9b875f065d226908a29c25cdf9343f8"},{"url":"https://git.kernel.org/stable/c/e1b7932af47f92432be8303d2439d1bf77b0be23"},{"url":"https://git.kernel.org/stable/c/cd8d8bbd9ced4cc5d06d858f67d4aa87745e8f38"},{"url":"https://git.kernel.org/stable/c/3c13db3e47e170bab19e574404e7b6be45ea873d"},{"url":"https://git.kernel.org/stable/c/46aeb66e9e54ed0d56c18615e1c3dbd502b327ab"},{"url":"https://git.kernel.org/stable/c/54e6fe9dd3b0e7c481c2228782c9494d653546da"}],"title":"ipv6: prevent infinite loop in rt6_nlmsg_size()","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"title":"CVE Program Container","references":[{"url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-03T17:40:13.723Z"}}]}}