-

CVE-2025-38193

In the Linux kernel, the following vulnerability has been resolved:

net_sched: sch_sfq: reject invalid perturb period

Gerrard Tai reported that SFQ perturb_period has no range check yet,
and this can be used to trigger a race condition fixed in a separate patch.

We want to make sure ctl->perturb_period * HZ will not overflow
and is positive.


tc qd add dev lo root sfq perturb -10   # negative value : error
Error: sch_sfq: invalid perturb period.

tc qd add dev lo root sfq perturb 1000000000 # too big : error
Error: sch_sfq: invalid perturb period.

tc qd add dev lo root sfq perturb 2000000 # acceptable value
tc -s -d qd sh dev lo
qdisc sfq 8005: root refcnt 2 limit 127p quantum 64Kb depth 127 flows 128 divisor 1024 perturb 2000000sec
 Sent 0 bytes 0 pkt (dropped 0, overlimits 0 requeues 0)
 backlog 0b 0p requeues 0

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < e0936ff56be4e08ad5b60ec26971eae0c40af305
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 2254d038dab9c194fe6a4b1ce31034f42e91a6e5
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 956b5aebb349449b38d920d444ca1392d43719d1
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < b11a50544af691b787384089b68f740ae20a441b
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 0357da9149eac621f39e235a135ebf155f01f7c3
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < f9b97d466e6026ccbdda30bb5b71965b67ccbc82
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 590b2d7d0beadba2aa576708a05a05f0aae39295
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
Version < 7ca52541c05c832d32b112274f81a985101f9ba8
Version 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 2.6.12
Status affected
Version < 2.6.12
Version 0
Status unaffected
Version <= 5.4.*
Version 5.4.297
Status unaffected
Version <= 5.10.*
Version 5.10.240
Status unaffected
Version <= 5.15.*
Version 5.15.186
Status unaffected
Version <= 6.1.*
Version 6.1.142
Status unaffected
Version <= 6.6.*
Version 6.6.95
Status unaffected
Version <= 6.12.*
Version 6.12.35
Status unaffected
Version <= 6.15.*
Version 6.15.4
Status unaffected
Version <= *
Version 6.16
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.04% 0.097
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string