5.5
MEDIUM CVSS 3.1
CVE-2025-38587
ipv6: fix possible infinite loop in fib6_info_uses_dev()
Description

In the Linux kernel, the following vulnerability has been resolved: ipv6: fix possible infinite loop in fib6_info_uses_dev() fib6_info_uses_dev() seems to rely on RCU without an explicit protection. Like the prior fix in rt6_nlmsg_size(), we need to make sure fib6_del_route() or fib6_add_rt2node() have not removed the anchor from the list, or we risk an infinite loop.

INFO

Published Date :

Aug. 19, 2025, 5:15 p.m.

Last Modified :

Jan. 7, 2026, 6:45 p.m.

Remotely Exploit :

No

Source :

416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Products

The following products are affected by CVE-2025-38587 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Linux linux_kernel
1 Debian debian_linux
CVSS Scores
The Common Vulnerability Scoring System is a standardized framework for assessing the severity of vulnerabilities in software and systems. We collect and displays CVSS scores from various sources for each CVE.
Score Version Severity Vector Exploitability Score Impact Score Source
CVSS 3.1 MEDIUM [email protected]
Solution
Resolve infinite loop in Linux kernel's ipv6 module by updating or patching.
  • Update the Linux kernel to a fixed version.
  • Apply the provided kernel patch.
  • Test the stability after applying the fix.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2025-38587 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2025-38587 weaknesses.

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2025-38587 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2025-38587 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • Initial Analysis by [email protected]

    Jan. 07, 2026

    Action Type Old Value New Value
    Added CVSS V3.1 AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
    Added CWE CWE-835
    Added CPE Configuration OR *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.11.11 up to (excluding) 6.12 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.16 up to (excluding) 6.16.1 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.13 up to (excluding) 6.15.10 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.1.128 up to (excluding) 6.1.148 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.12.2 up to (excluding) 6.12.42 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.6.75 up to (excluding) 6.6.102
    Added CPE Configuration OR *cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/16d21816c0918f8058b5fc14cbe8595d62046e2d Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/9cb6de8ee144a94ae7a40bdb32560329ab7276f0 Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/bc85e62394f008fa848c4ba02c936c735a3e8ef5 Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/db65739d406c72776fbdbbc334be827ef05880d2 Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/e09be457b71b983a085312ff9e981f51e4ed3211 Types: Patch
    Added Reference Type kernel.org: https://git.kernel.org/stable/c/f8d8ce1b515a0a6af72b30502670a406cfb75073 Types: Patch
    Added Reference Type CVE: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html Types: Third Party Advisory
  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Nov. 03, 2025

    Action Type Old Value New Value
    Added Reference https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html
  • New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67

    Aug. 19, 2025

    Action Type Old Value New Value
    Added Description In the Linux kernel, the following vulnerability has been resolved: ipv6: fix possible infinite loop in fib6_info_uses_dev() fib6_info_uses_dev() seems to rely on RCU without an explicit protection. Like the prior fix in rt6_nlmsg_size(), we need to make sure fib6_del_route() or fib6_add_rt2node() have not removed the anchor from the list, or we risk an infinite loop.
    Added Reference https://git.kernel.org/stable/c/16d21816c0918f8058b5fc14cbe8595d62046e2d
    Added Reference https://git.kernel.org/stable/c/9cb6de8ee144a94ae7a40bdb32560329ab7276f0
    Added Reference https://git.kernel.org/stable/c/bc85e62394f008fa848c4ba02c936c735a3e8ef5
    Added Reference https://git.kernel.org/stable/c/db65739d406c72776fbdbbc334be827ef05880d2
    Added Reference https://git.kernel.org/stable/c/e09be457b71b983a085312ff9e981f51e4ed3211
    Added Reference https://git.kernel.org/stable/c/f8d8ce1b515a0a6af72b30502670a406cfb75073
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
Vulnerability Scoring Details
Base CVSS Score: 5.5
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact