-

CVE-2025-38553

In the Linux kernel, the following vulnerability has been resolved:

net/sched: Restrict conditions for adding duplicating netems to qdisc tree

netem_enqueue's duplication prevention logic breaks when a netem
resides in a qdisc tree with other netems - this can lead to a
soft lockup and OOM loop in netem_dequeue, as seen in [1].
Ensure that a duplicating netem cannot exist in a tree with other
netems.

Previous approaches suggested in discussions in chronological order:

1) Track duplication status or ttl in the sk_buff struct. Considered
too specific a use case to extend such a struct, though this would
be a resilient fix and address other previous and potential future
DOS bugs like the one described in loopy fun [2].

2) Restrict netem_enqueue recursion depth like in act_mirred with a
per cpu variable. However, netem_dequeue can call enqueue on its
child, and the depth restriction could be bypassed if the child is a
netem.

3) Use the same approach as in 2, but add metadata in netem_skb_cb
to handle the netem_dequeue case and track a packet's involvement
in duplication. This is an overly complex approach, and Jamal
notes that the skb cb can be overwritten to circumvent this
safeguard.

4) Prevent the addition of a netem to a qdisc tree if its ancestral
path contains a netem. However, filters and actions can cause a
packet to change paths when re-enqueued to the root from netem
duplication, leading us to the current solution: prevent a
duplicating netem from inhabiting the same tree as other netems.

[1] https://lore.kernel.org/netdev/8DuRWwfqjoRDLDmBMlIfbrsZg9Gx50DHJc1ilxsEBNe2D6NMoigR_eIRIG0LOjMc3r10nUUZtArXx4oZBIdUfZQrwjcQhdinnMis_0G7VEk=@willsroot.io/
[2] https://lwn.net/Articles/719297/

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < ad340a4b4adb855b18b3666f26ad65c8968e2deb
Version 0afb51e72855971dba83b3c6b70c547c2d1161fd
Status affected
Version < f088b6ebe8797a3f948d2cae47f34bfb45cc6522
Version 0afb51e72855971dba83b3c6b70c547c2d1161fd
Status affected
Version < cab2809944989889f88a1a8b5cff1c78460c72cb
Version 0afb51e72855971dba83b3c6b70c547c2d1161fd
Status affected
Version < 325f5ec67cc0a77f2d0d453445b9857f1cd06c76
Version 0afb51e72855971dba83b3c6b70c547c2d1161fd
Status affected
Version < 103c4e27ec9f5fe53022e46e976abf52c7221baf
Version 0afb51e72855971dba83b3c6b70c547c2d1161fd
Status affected
Version < 795cb393e38977aa991e70a9363da0ee734b2114
Version 0afb51e72855971dba83b3c6b70c547c2d1161fd
Status affected
Version < 250f8796006c0f2bc638ce545f601d49ae8d528b
Version 0afb51e72855971dba83b3c6b70c547c2d1161fd
Status affected
Version < 09317dfb681ac5a96fc69bea0c54441cf91b8270
Version 0afb51e72855971dba83b3c6b70c547c2d1161fd
Status affected
Version < ec8e0e3d7adef940cdf9475e2352c0680189d14e
Version 0afb51e72855971dba83b3c6b70c547c2d1161fd
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 2.6.12
Status affected
Version < 2.6.12
Version 0
Status unaffected
Version <= 5.4.*
Version 5.4.297
Status unaffected
Version <= 5.10.*
Version 5.10.241
Status unaffected
Version <= 5.15.*
Version 5.15.190
Status unaffected
Version <= 6.1.*
Version 6.1.148
Status unaffected
Version <= 6.6.*
Version 6.6.102
Status unaffected
Version <= 6.12.*
Version 6.12.42
Status unaffected
Version <= 6.15.*
Version 6.15.10
Status unaffected
Version <= 6.16.*
Version 6.16.1
Status unaffected
Version <= *
Version 6.17-rc1
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.05% 0.142
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string