CVE-2025-38572
📋 TL;DR
A vulnerability in the Linux kernel's IPv6 Generic Segmentation Offload (GSO) implementation allows crafted packets with excessive IPv6 extension headers to overflow the 16-bit transport_header field, potentially causing kernel crashes or denial of service. This affects Linux systems with IPv6 enabled and GSO functionality active. Attackers can exploit this remotely by sending malicious IPv6 packets.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Kernel panic leading to system crash and denial of service, potentially allowing limited local privilege escalation if combined with other vulnerabilities.
Likely Case
System crash or kernel panic causing denial of service on affected systems.
If Mitigated
Minimal impact if systems are patched or have IPv6 disabled.
🎯 Exploit Status
The vulnerability was discovered through fuzzing (syzbot), suggesting reliable exploitation is possible.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Linux kernel with commits 09ff062b89d8e48165247d677d1ca23d6d607e9b, 3f638e0b28bde7c3354a0df938ab3a96739455d1, 5489e7fc6f8be3062f8cb7e49406de4bfd94db67, 573b8250fc2554761db3bc2bbdbab23789d52d4e, or 5dc60b2a00ed7629214ac0c48e43f40af2078703
Vendor Advisory: https://git.kernel.org/stable/c/09ff062b89d8e48165247d677d1ca23d6d607e9b
Restart Required: Yes
Instructions:
1. Update Linux kernel to patched version. 2. For distributions: Use package manager (apt/yum/dnf) to update kernel package. 3. Reboot system to load new kernel.
🔧 Temporary Workarounds
Disable IPv6
linuxCompletely disable IPv6 functionality to prevent exploitation
echo 'net.ipv6.conf.all.disable_ipv6 = 1' >> /etc/sysctl.conf
echo 'net.ipv6.conf.default.disable_ipv6 = 1' >> /etc/sysctl.conf
sysctl -p
Disable GSO for IPv6
linuxDisable Generic Segmentation Offload for IPv6 traffic
ethtool -K <interface> gso off
ethtool -K <interface> gro off
ethtool -K <interface> tso off
🧯 If You Can't Patch
- Implement network filtering to block IPv6 packets with excessive extension headers
- Use firewalls to restrict IPv6 traffic to trusted sources only
🔍 How to Verify
Check if Vulnerable:
Check kernel version and compare with patched versions from your distribution's security advisories
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version after update matches patched version, check that system doesn't crash when receiving test IPv6 packets
📡 Detection & Monitoring
Log Indicators:
- Kernel panic messages in /var/log/messages or dmesg
- System crash/reboot logs
- Network interface errors
Network Indicators:
- Unusual IPv6 packets with many extension headers
- Traffic patterns attempting to trigger GSO segmentation
SIEM Query:
source="kernel" AND ("panic" OR "Oops" OR "BUG") AND ("ipv6" OR "GSO" OR "transport_header")
🔗 References
- https://git.kernel.org/stable/c/09ff062b89d8e48165247d677d1ca23d6d607e9b
- https://git.kernel.org/stable/c/3f638e0b28bde7c3354a0df938ab3a96739455d1
- https://git.kernel.org/stable/c/5489e7fc6f8be3062f8cb7e49406de4bfd94db67
- https://git.kernel.org/stable/c/573b8250fc2554761db3bc2bbdbab23789d52d4e
- https://git.kernel.org/stable/c/5dc60b2a00ed7629214ac0c48e43f40af2078703
- https://git.kernel.org/stable/c/d45cf1e7d7180256e17c9ce88e32e8061a7887fe
- https://git.kernel.org/stable/c/de322cdf600fc9433845a9e944d1ca6b31cfb67e
- https://git.kernel.org/stable/c/ee851768e4b8371ce151fd446d24bf3ae2d18789
- https://git.kernel.org/stable/c/ef05007b403dcc21e701cb1f30d4572ac0a9da20
- https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html