CVE-2025-38572
BaseFortify
Publication date: 2025-08-19
Last updated on: 2025-11-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | kernel | 5.10.244-1 |
| linux | kernel | 6.1.153-1 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's IPv6 implementation, specifically in the ipv6_gso_segment() function. An attacker can craft IPv6 packets with very long extension headers that cause an overflow of the skb->transport_header field, which is a 16-bit field with a limited range. This overflow can lead to improper handling of network packets, potentially causing kernel errors or crashes. The issue was fixed by adding a helper function skb_reset_transport_header_careful() to properly handle the transport header.
How can this vulnerability impact me? :
This vulnerability can impact you by allowing crafted IPv6 packets with maliciously long extension headers to overflow a critical kernel field, potentially leading to kernel crashes or instability. This could be exploited to cause denial of service or other unexpected behavior in systems running vulnerable Linux kernels.