-
CVE-2025-38572
- EPSS 0.05%
- Published 19.08.2025 17:15:34
- Last modified 28.08.2025 15:15:53
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: ipv6: reject malicious packets in ipv6_gso_segment() syzbot was able to craft a packet with very long IPv6 extension headers leading to an overflow of skb->transport_header. This 16bit field has a limited range. Add skb_reset_transport_header_careful() helper and use it from ipv6_gso_segment() WARNING: CPU: 0 PID: 5871 at ./include/linux/skbuff.h:3032 skb_reset_transport_header include/linux/skbuff.h:3032 [inline] WARNING: CPU: 0 PID: 5871 at ./include/linux/skbuff.h:3032 ipv6_gso_segment+0x15e2/0x21e0 net/ipv6/ip6_offload.c:151 Modules linked in: CPU: 0 UID: 0 PID: 5871 Comm: syz-executor211 Not tainted 6.16.0-rc6-syzkaller-g7abc678e3084 #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 RIP: 0010:skb_reset_transport_header include/linux/skbuff.h:3032 [inline] RIP: 0010:ipv6_gso_segment+0x15e2/0x21e0 net/ipv6/ip6_offload.c:151 Call Trace: <TASK> skb_mac_gso_segment+0x31c/0x640 net/core/gso.c:53 nsh_gso_segment+0x54a/0xe10 net/nsh/nsh.c:110 skb_mac_gso_segment+0x31c/0x640 net/core/gso.c:53 __skb_gso_segment+0x342/0x510 net/core/gso.c:124 skb_gso_segment include/net/gso.h:83 [inline] validate_xmit_skb+0x857/0x11b0 net/core/dev.c:3950 validate_xmit_skb_list+0x84/0x120 net/core/dev.c:4000 sch_direct_xmit+0xd3/0x4b0 net/sched/sch_generic.c:329 __dev_xmit_skb net/core/dev.c:4102 [inline] __dev_queue_xmit+0x17b6/0x3a70 net/core/dev.c:4679
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
5dc60b2a00ed7629214ac0c48e43f40af2078703
Version
d1da932ed4ecad2a14cbcc01ed589d617d0f0f09
Status
affected
Version <
3f638e0b28bde7c3354a0df938ab3a96739455d1
Version
d1da932ed4ecad2a14cbcc01ed589d617d0f0f09
Status
affected
Version <
09ff062b89d8e48165247d677d1ca23d6d607e9b
Version
d1da932ed4ecad2a14cbcc01ed589d617d0f0f09
Status
affected
Version <
de322cdf600fc9433845a9e944d1ca6b31cfb67e
Version
d1da932ed4ecad2a14cbcc01ed589d617d0f0f09
Status
affected
Version <
ef05007b403dcc21e701cb1f30d4572ac0a9da20
Version
d1da932ed4ecad2a14cbcc01ed589d617d0f0f09
Status
affected
Version <
5489e7fc6f8be3062f8cb7e49406de4bfd94db67
Version
d1da932ed4ecad2a14cbcc01ed589d617d0f0f09
Status
affected
Version <
573b8250fc2554761db3bc2bbdbab23789d52d4e
Version
d1da932ed4ecad2a14cbcc01ed589d617d0f0f09
Status
affected
Version <
ee851768e4b8371ce151fd446d24bf3ae2d18789
Version
d1da932ed4ecad2a14cbcc01ed589d617d0f0f09
Status
affected
Version <
d45cf1e7d7180256e17c9ce88e32e8061a7887fe
Version
d1da932ed4ecad2a14cbcc01ed589d617d0f0f09
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
3.8
Status
affected
Version <
3.8
Version
0
Status
unaffected
Version <=
5.4.*
Version
5.4.297
Status
unaffected
Version <=
5.10.*
Version
5.10.241
Status
unaffected
Version <=
5.15.*
Version
5.15.190
Status
unaffected
Version <=
6.1.*
Version
6.1.148
Status
unaffected
Version <=
6.6.*
Version
6.6.102
Status
unaffected
Version <=
6.12.*
Version
6.12.42
Status
unaffected
Version <=
6.15.*
Version
6.15.10
Status
unaffected
Version <=
6.16.*
Version
6.16.1
Status
unaffected
Version <=
*
Version
6.17-rc1
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.05% | 0.142 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|