)]}'
{
  "commit": "7d652a445dcf53f2d738dc02d7432bf0cd5bf60a",
  "tree": "00ded8fb409e20d4331b45f7da6cacccc399ec3f",
  "parents": [
    "839c170989b06759cb605629c86f75bf23ecbe36"
  ],
  "author": {
    "name": "Eric Dumazet",
    "email": "edumazet@google.com",
    "time": "Fri Jul 25 14:07:24 2025 +0000"
  },
  "committer": {
    "name": "Robert Kolchmeyer",
    "email": "rkolchmeyer@google.com",
    "time": "Wed Sep 10 19:16:43 2025 -0700"
  },
  "message": "ipv6: fix possible infinite loop in fib6_info_uses_dev()\n\n[ Upstream commit f8d8ce1b515a0a6af72b30502670a406cfb75073 ]\n\nfib6_info_uses_dev() seems to rely on RCU without an explicit\nprotection.\n\nLike the prior fix in rt6_nlmsg_size(),\nwe need to make sure fib6_del_route() or fib6_add_rt2node()\nhave not removed the anchor from the list, or we risk an infinite loop.\n\nBUG\u003db/440033339\nTEST\u003dpresubmit\nRELEASE_NOTE\u003dFixed CVE-2025-38587 in the Linux kernel.\n\ncos-patch: security-moderate\nFixes: d9ccb18f83ea (\"ipv6: Fix soft lockups in fib6_select_path under high next hop churn\")\nChange-Id: I4428d00557080502bfaa367cc7ef376925ce641b\nSigned-off-by: Eric Dumazet \u003cedumazet@google.com\u003e\nLink: https://patch.msgid.link/20250725140725.3626540-4-edumazet@google.com\nSigned-off-by: Jakub Kicinski \u003ckuba@kernel.org\u003e\nSigned-off-by: Sasha Levin \u003csashal@kernel.org\u003e\nSigned-off-by: Robert Kolchmeyer \u003crkolchmeyer@google.com\u003e\nReviewed-on: https://cos-review.googlesource.com/c/third_party/kernel/+/111089\nReviewed-by: Chenglong Tang \u003cchenglongtang@google.com\u003e\nTested-by: Cusky Presubmit Bot \u003cpresubmit@cos-infra-prod.iam.gserviceaccount.com\u003e\n",
  "tree_diff": [
    {
      "type": "modify",
      "old_id": "4e6b833dc40bb49ec4e097415a58693b056b048d",
      "old_mode": 33188,
      "old_path": "net/ipv6/route.c",
      "new_id": "f674b8935536b4be9cd6644c59aa9227b3393b8c",
      "new_mode": 33188,
      "new_path": "net/ipv6/route.c"
    }
  ]
}
