In the Linux kernel, the following vulnerability has been resolved:
ipv6: prevent infinite loop in rt6_nlmsg_size()
While testing prior patch, I was able to trigger
an infinite loop in rt6_nlmsg_size() in the following place:
list_for_each_entry_rcu(sibling, &f6i->fib6_siblings,
fib6_siblings) {
rt6_nh_nlmsg_size(sibling->fib6_nh, &nexthop_len);
}
This is because fib6_del_route() and fib6_add_rt2node()
uses list_del_rcu(), which can confuse rcu readers,
because they might no longer see the head of the list.
Restart the loop if f6i->fib6_nsiblings is zero.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
No history.
Information
Published : 2025-08-19 17:15
Updated : 2026-01-07 18:44
NVD link : CVE-2025-38588
Mitre link : CVE-2025-38588
CVE.ORG link : CVE-2025-38588
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-835
Loop with Unreachable Exit Condition ('Infinite Loop')
