CVE-2025-38588

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-38588
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38588.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-38588
Downstream
Related
Published
2025-08-19T17:15:36Z
Modified
2025-09-06T13:01:26Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

ipv6: prevent infinite loop in rt6nlmsgsize()

While testing prior patch, I was able to trigger an infinite loop in rt6nlmsgsize() in the following place:

listforeachentryrcu(sibling, &f6i->fib6siblings, fib6siblings) { rt6nhnlmsgsize(sibling->fib6nh, &nexthop_len); }

This is because fib6delroute() and fib6addrt2node() uses listdelrcu(), which can confuse rcu readers, because they might no longer see the head of the list.

Restart the loop if f6i->fib6_nsiblings is zero.

References

Affected packages