-
CVE-2025-38457
- EPSS 0.04%
- Published 25.07.2025 16:15:31
- Last modified 29.07.2025 14:14:55
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: net/sched: Abort __tc_modify_qdisc if parent class does not exist Lion's patch [1] revealed an ancient bug in the qdisc API. Whenever a user creates/modifies a qdisc specifying as a parent another qdisc, the qdisc API will, during grafting, detect that the user is not trying to attach to a class and reject. However grafting is performed after qdisc_create (and thus the qdiscs' init callback) is executed. In qdiscs that eventually call qdisc_tree_reduce_backlog during init or change (such as fq, hhf, choke, etc), an issue arises. For example, executing the following commands: sudo tc qdisc add dev lo root handle a: htb default 2 sudo tc qdisc add dev lo parent a: handle beef fq Qdiscs such as fq, hhf, choke, etc unconditionally invoke qdisc_tree_reduce_backlog() in their control path init() or change() which then causes a failure to find the child class; however, that does not stop the unconditional invocation of the assumed child qdisc's qlen_notify with a null class. All these qdiscs make the assumption that class is non-null. The solution is ensure that qdisc_leaf() which looks up the parent class, and is invoked prior to qdisc_create(), should return failure on not finding the class. In this patch, we leverage qdisc_leaf to return ERR_PTRs whenever the parentid doesn't correspond to a class, so that we can detect it earlier on and abort before qdisc_create is called. [1] https://lore.kernel.org/netdev/d912cbd7-193b-4269-9857-525bee8bbb6a@gmail.com/
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
923a276c74e25073ae391e930792ac86a9f77f1e
Version
5e50da01d0ce7ef0ba3ed6cfabd62f327da0aca6
Status
affected
Version <
90436e72c9622c2f70389070088325a3232d339f
Version
5e50da01d0ce7ef0ba3ed6cfabd62f327da0aca6
Status
affected
Version <
25452638f133ac19d75af3f928327d8016952c8e
Version
5e50da01d0ce7ef0ba3ed6cfabd62f327da0aca6
Status
affected
Version <
23c165dde88eac405eebb59051ea1fe139a45803
Version
5e50da01d0ce7ef0ba3ed6cfabd62f327da0aca6
Status
affected
Version <
4c691d1b6b6dbd73f30ed9ee7da05f037b0c49af
Version
5e50da01d0ce7ef0ba3ed6cfabd62f327da0aca6
Status
affected
Version <
8ecd651ef24ab50123692a4e3e25db93cb11602a
Version
5e50da01d0ce7ef0ba3ed6cfabd62f327da0aca6
Status
affected
Version <
e28a383d6485c3bb51dc5953552f76c4dea33eea
Version
5e50da01d0ce7ef0ba3ed6cfabd62f327da0aca6
Status
affected
Version <
ffdde7bf5a439aaa1955ebd581f5c64ab1533963
Version
5e50da01d0ce7ef0ba3ed6cfabd62f327da0aca6
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
2.6.20
Status
affected
Version <
2.6.20
Version
0
Status
unaffected
Version <=
5.4.*
Version
5.4.296
Status
unaffected
Version <=
5.10.*
Version
5.10.240
Status
unaffected
Version <=
5.15.*
Version
5.15.189
Status
unaffected
Version <=
6.1.*
Version
6.1.146
Status
unaffected
Version <=
6.6.*
Version
6.6.99
Status
unaffected
Version <=
6.12.*
Version
6.12.39
Status
unaffected
Version <=
6.15.*
Version
6.15.7
Status
unaffected
Version <=
*
Version
6.16
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.04% | 0.103 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|