-

CVE-2025-38115

In the Linux kernel, the following vulnerability has been resolved:

net_sched: sch_sfq: fix a potential crash on gso_skb handling

SFQ has an assumption of always being able to queue at least one packet.

However, after the blamed commit, sch->q.len can be inflated by packets
in sch->gso_skb, and an enqueue() on an empty SFQ qdisc can be followed
by an immediate drop.

Fix sfq_drop() to properly clear q->tail in this situation.


ip netns add lb
ip link add dev to-lb type veth peer name in-lb netns lb
ethtool -K to-lb tso off                 # force qdisc to requeue gso_skb
ip netns exec lb ethtool -K in-lb gro on # enable NAPI
ip link set dev to-lb up
ip -netns lb link set dev in-lb up
ip addr add dev to-lb 192.168.20.1/24
ip -netns lb addr add dev in-lb 192.168.20.2/24
tc qdisc replace dev to-lb root sfq limit 100

ip netns exec lb netserver

netperf -H 192.168.20.2 -l 100 &
netperf -H 192.168.20.2 -l 100 &
netperf -H 192.168.20.2 -l 100 &
netperf -H 192.168.20.2 -l 100 &

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < c337efb20d6d9f9bbb4746f6b119917af5c886dc
Version a53851e2c3218aa30b77abd6e68cf1c371f15afe
Status affected
Version < b44f791f27b14c9eb6b907fbe51f2ba8bec32085
Version a53851e2c3218aa30b77abd6e68cf1c371f15afe
Status affected
Version < 5814a7fc3abb41f63f2d44c9d3ff9d4e62965b72
Version a53851e2c3218aa30b77abd6e68cf1c371f15afe
Status affected
Version < 9c19498bdd7cb9d854bd3c54260f71cf7408495e
Version a53851e2c3218aa30b77abd6e68cf1c371f15afe
Status affected
Version < b4e9bab6011b9559b7c157b16b91ae46d4d8c533
Version a53851e2c3218aa30b77abd6e68cf1c371f15afe
Status affected
Version < d1bc80da75c789f2f6830df89d91fb2f7a509943
Version a53851e2c3218aa30b77abd6e68cf1c371f15afe
Status affected
Version < 82448d4dcd8406dec688632a405fdcf7f170ec69
Version a53851e2c3218aa30b77abd6e68cf1c371f15afe
Status affected
Version < 82ffbe7776d0ac084031f114167712269bf3d832
Version a53851e2c3218aa30b77abd6e68cf1c371f15afe
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 4.16
Status affected
Version < 4.16
Version 0
Status unaffected
Version <= 5.4.*
Version 5.4.295
Status unaffected
Version <= 5.10.*
Version 5.10.239
Status unaffected
Version <= 5.15.*
Version 5.15.186
Status unaffected
Version <= 6.1.*
Version 6.1.142
Status unaffected
Version <= 6.6.*
Version 6.6.94
Status unaffected
Version <= 6.12.*
Version 6.12.34
Status unaffected
Version <= 6.15.*
Version 6.15.3
Status unaffected
Version <= *
Version 6.16
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.04% 0.097
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string