-

CVE-2025-38572

In the Linux kernel, the following vulnerability has been resolved:

ipv6: reject malicious packets in ipv6_gso_segment()

syzbot was able to craft a packet with very long IPv6 extension headers
leading to an overflow of skb->transport_header.

This 16bit field has a limited range.

Add skb_reset_transport_header_careful() helper and use it
from ipv6_gso_segment()

WARNING: CPU: 0 PID: 5871 at ./include/linux/skbuff.h:3032 skb_reset_transport_header include/linux/skbuff.h:3032 [inline]
WARNING: CPU: 0 PID: 5871 at ./include/linux/skbuff.h:3032 ipv6_gso_segment+0x15e2/0x21e0 net/ipv6/ip6_offload.c:151
Modules linked in:
CPU: 0 UID: 0 PID: 5871 Comm: syz-executor211 Not tainted 6.16.0-rc6-syzkaller-g7abc678e3084 #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025
 RIP: 0010:skb_reset_transport_header include/linux/skbuff.h:3032 [inline]
 RIP: 0010:ipv6_gso_segment+0x15e2/0x21e0 net/ipv6/ip6_offload.c:151
Call Trace:
 <TASK>
  skb_mac_gso_segment+0x31c/0x640 net/core/gso.c:53
  nsh_gso_segment+0x54a/0xe10 net/nsh/nsh.c:110
  skb_mac_gso_segment+0x31c/0x640 net/core/gso.c:53
  __skb_gso_segment+0x342/0x510 net/core/gso.c:124
  skb_gso_segment include/net/gso.h:83 [inline]
  validate_xmit_skb+0x857/0x11b0 net/core/dev.c:3950
  validate_xmit_skb_list+0x84/0x120 net/core/dev.c:4000
  sch_direct_xmit+0xd3/0x4b0 net/sched/sch_generic.c:329
  __dev_xmit_skb net/core/dev.c:4102 [inline]
  __dev_queue_xmit+0x17b6/0x3a70 net/core/dev.c:4679

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
Produkt Linux
Default Statusunaffected
Version < 5dc60b2a00ed7629214ac0c48e43f40af2078703
Version d1da932ed4ecad2a14cbcc01ed589d617d0f0f09
Status affected
Version < 3f638e0b28bde7c3354a0df938ab3a96739455d1
Version d1da932ed4ecad2a14cbcc01ed589d617d0f0f09
Status affected
Version < 09ff062b89d8e48165247d677d1ca23d6d607e9b
Version d1da932ed4ecad2a14cbcc01ed589d617d0f0f09
Status affected
Version < de322cdf600fc9433845a9e944d1ca6b31cfb67e
Version d1da932ed4ecad2a14cbcc01ed589d617d0f0f09
Status affected
Version < ef05007b403dcc21e701cb1f30d4572ac0a9da20
Version d1da932ed4ecad2a14cbcc01ed589d617d0f0f09
Status affected
Version < 5489e7fc6f8be3062f8cb7e49406de4bfd94db67
Version d1da932ed4ecad2a14cbcc01ed589d617d0f0f09
Status affected
Version < 573b8250fc2554761db3bc2bbdbab23789d52d4e
Version d1da932ed4ecad2a14cbcc01ed589d617d0f0f09
Status affected
Version < ee851768e4b8371ce151fd446d24bf3ae2d18789
Version d1da932ed4ecad2a14cbcc01ed589d617d0f0f09
Status affected
Version < d45cf1e7d7180256e17c9ce88e32e8061a7887fe
Version d1da932ed4ecad2a14cbcc01ed589d617d0f0f09
Status affected
HerstellerLinux
Produkt Linux
Default Statusaffected
Version 3.8
Status affected
Version < 3.8
Version 0
Status unaffected
Version <= 5.4.*
Version 5.4.297
Status unaffected
Version <= 5.10.*
Version 5.10.241
Status unaffected
Version <= 5.15.*
Version 5.15.190
Status unaffected
Version <= 6.1.*
Version 6.1.148
Status unaffected
Version <= 6.6.*
Version 6.6.102
Status unaffected
Version <= 6.12.*
Version 6.12.42
Status unaffected
Version <= 6.15.*
Version 6.15.10
Status unaffected
Version <= 6.16.*
Version 6.16.1
Status unaffected
Version <= *
Version 6.17-rc1
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.05% 0.142
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String