CVE-2025-38310
BaseFortify
Publication date: 2025-07-10
Last updated on: 2025-11-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel relates to the validation of nexthop addresses in the seg6 module. The kernel only checked that the length of the provided nexthop address did not exceed the specified length, which could cause it to read uninitialized memory if the user provided a shorter length than expected. The fix ensures that the provided length exactly matches the specified length to prevent this issue.
How can this vulnerability impact me? :
The vulnerability could lead to the kernel reading uninitialized memory, which may cause unpredictable behavior, potential information leakage, or system instability. This could impact system security and reliability if exploited.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version where the seg6 nexthop address validation fix has been applied. This fix ensures that the kernel properly validates the length of the provided nexthop address, preventing potential memory issues.