-
CVE-2025-38115
- EPSS 0.04%
- Veröffentlicht 03.07.2025 08:35:23
- Zuletzt bearbeitet 03.07.2025 15:13:53
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- Teams Watchlist Login
- Unerledigt Login
In the Linux kernel, the following vulnerability has been resolved: net_sched: sch_sfq: fix a potential crash on gso_skb handling SFQ has an assumption of always being able to queue at least one packet. However, after the blamed commit, sch->q.len can be inflated by packets in sch->gso_skb, and an enqueue() on an empty SFQ qdisc can be followed by an immediate drop. Fix sfq_drop() to properly clear q->tail in this situation. ip netns add lb ip link add dev to-lb type veth peer name in-lb netns lb ethtool -K to-lb tso off # force qdisc to requeue gso_skb ip netns exec lb ethtool -K in-lb gro on # enable NAPI ip link set dev to-lb up ip -netns lb link set dev in-lb up ip addr add dev to-lb 192.168.20.1/24 ip -netns lb addr add dev in-lb 192.168.20.2/24 tc qdisc replace dev to-lb root sfq limit 100 ip netns exec lb netserver netperf -H 192.168.20.2 -l 100 & netperf -H 192.168.20.2 -l 100 & netperf -H 192.168.20.2 -l 100 & netperf -H 192.168.20.2 -l 100 &
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version <
c337efb20d6d9f9bbb4746f6b119917af5c886dc
Version
a53851e2c3218aa30b77abd6e68cf1c371f15afe
Status
affected
Version <
b44f791f27b14c9eb6b907fbe51f2ba8bec32085
Version
a53851e2c3218aa30b77abd6e68cf1c371f15afe
Status
affected
Version <
5814a7fc3abb41f63f2d44c9d3ff9d4e62965b72
Version
a53851e2c3218aa30b77abd6e68cf1c371f15afe
Status
affected
Version <
9c19498bdd7cb9d854bd3c54260f71cf7408495e
Version
a53851e2c3218aa30b77abd6e68cf1c371f15afe
Status
affected
Version <
b4e9bab6011b9559b7c157b16b91ae46d4d8c533
Version
a53851e2c3218aa30b77abd6e68cf1c371f15afe
Status
affected
Version <
d1bc80da75c789f2f6830df89d91fb2f7a509943
Version
a53851e2c3218aa30b77abd6e68cf1c371f15afe
Status
affected
Version <
82448d4dcd8406dec688632a405fdcf7f170ec69
Version
a53851e2c3218aa30b77abd6e68cf1c371f15afe
Status
affected
Version <
82ffbe7776d0ac084031f114167712269bf3d832
Version
a53851e2c3218aa30b77abd6e68cf1c371f15afe
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
4.16
Status
affected
Version <
4.16
Version
0
Status
unaffected
Version <=
5.4.*
Version
5.4.295
Status
unaffected
Version <=
5.10.*
Version
5.10.239
Status
unaffected
Version <=
5.15.*
Version
5.15.186
Status
unaffected
Version <=
6.1.*
Version
6.1.142
Status
unaffected
Version <=
6.6.*
Version
6.6.94
Status
unaffected
Version <=
6.12.*
Version
6.12.34
Status
unaffected
Version <=
6.15.*
Version
6.15.3
Status
unaffected
Version <=
*
Version
6.16
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.04% | 0.097 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|