-

CVE-2025-38572

In the Linux kernel, the following vulnerability has been resolved:

ipv6: reject malicious packets in ipv6_gso_segment()

syzbot was able to craft a packet with very long IPv6 extension headers
leading to an overflow of skb->transport_header.

This 16bit field has a limited range.

Add skb_reset_transport_header_careful() helper and use it
from ipv6_gso_segment()

WARNING: CPU: 0 PID: 5871 at ./include/linux/skbuff.h:3032 skb_reset_transport_header include/linux/skbuff.h:3032 [inline]
WARNING: CPU: 0 PID: 5871 at ./include/linux/skbuff.h:3032 ipv6_gso_segment+0x15e2/0x21e0 net/ipv6/ip6_offload.c:151
Modules linked in:
CPU: 0 UID: 0 PID: 5871 Comm: syz-executor211 Not tainted 6.16.0-rc6-syzkaller-g7abc678e3084 #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025
 RIP: 0010:skb_reset_transport_header include/linux/skbuff.h:3032 [inline]
 RIP: 0010:ipv6_gso_segment+0x15e2/0x21e0 net/ipv6/ip6_offload.c:151
Call Trace:
 <TASK>
  skb_mac_gso_segment+0x31c/0x640 net/core/gso.c:53
  nsh_gso_segment+0x54a/0xe10 net/nsh/nsh.c:110
  skb_mac_gso_segment+0x31c/0x640 net/core/gso.c:53
  __skb_gso_segment+0x342/0x510 net/core/gso.c:124
  skb_gso_segment include/net/gso.h:83 [inline]
  validate_xmit_skb+0x857/0x11b0 net/core/dev.c:3950
  validate_xmit_skb_list+0x84/0x120 net/core/dev.c:4000
  sch_direct_xmit+0xd3/0x4b0 net/sched/sch_generic.c:329
  __dev_xmit_skb net/core/dev.c:4102 [inline]
  __dev_queue_xmit+0x17b6/0x3a70 net/core/dev.c:4679

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < 5dc60b2a00ed7629214ac0c48e43f40af2078703
Version d1da932ed4ecad2a14cbcc01ed589d617d0f0f09
Status affected
Version < 3f638e0b28bde7c3354a0df938ab3a96739455d1
Version d1da932ed4ecad2a14cbcc01ed589d617d0f0f09
Status affected
Version < 09ff062b89d8e48165247d677d1ca23d6d607e9b
Version d1da932ed4ecad2a14cbcc01ed589d617d0f0f09
Status affected
Version < de322cdf600fc9433845a9e944d1ca6b31cfb67e
Version d1da932ed4ecad2a14cbcc01ed589d617d0f0f09
Status affected
Version < ef05007b403dcc21e701cb1f30d4572ac0a9da20
Version d1da932ed4ecad2a14cbcc01ed589d617d0f0f09
Status affected
Version < 5489e7fc6f8be3062f8cb7e49406de4bfd94db67
Version d1da932ed4ecad2a14cbcc01ed589d617d0f0f09
Status affected
Version < 573b8250fc2554761db3bc2bbdbab23789d52d4e
Version d1da932ed4ecad2a14cbcc01ed589d617d0f0f09
Status affected
Version < ee851768e4b8371ce151fd446d24bf3ae2d18789
Version d1da932ed4ecad2a14cbcc01ed589d617d0f0f09
Status affected
Version < d45cf1e7d7180256e17c9ce88e32e8061a7887fe
Version d1da932ed4ecad2a14cbcc01ed589d617d0f0f09
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 3.8
Status affected
Version < 3.8
Version 0
Status unaffected
Version <= 5.4.*
Version 5.4.297
Status unaffected
Version <= 5.10.*
Version 5.10.241
Status unaffected
Version <= 5.15.*
Version 5.15.190
Status unaffected
Version <= 6.1.*
Version 6.1.148
Status unaffected
Version <= 6.6.*
Version 6.6.102
Status unaffected
Version <= 6.12.*
Version 6.12.42
Status unaffected
Version <= 6.15.*
Version 6.15.10
Status unaffected
Version <= 6.16.*
Version 6.16.1
Status unaffected
Version <= *
Version 6.17-rc1
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.05% 0.142
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string