-
CVE-2025-68325
- EPSS 0.05%
- Veröffentlicht 18.12.2025 15:16:06
- Zuletzt bearbeitet 15.04.2026 00:35:42
- Quelle 416baaa9-dc9f-4396-8d5f-8c081f
- CVE-Watchlists
- Unerledigt
net/sched: sch_cake: Fix incorrect qlen reduction in cake_drop
In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_cake: Fix incorrect qlen reduction in cake_drop In cake_drop(), qdisc_tree_reduce_backlog() is used to update the qlen and backlog of the qdisc hierarchy. Its caller, cake_enqueue(), assumes that the parent qdisc will enqueue the current packet. However, this assumption breaks when cake_enqueue() returns NET_XMIT_CN: the parent qdisc stops enqueuing current packet, leaving the tree qlen/backlog accounting inconsistent. This mismatch can lead to a NULL dereference (e.g., when the parent Qdisc is qfq_qdisc). This patch computes the qlen/backlog delta in a more robust way by observing the difference before and after the series of cake_drop() calls, and then compensates the qdisc tree accounting if cake_enqueue() returns NET_XMIT_CN. To ensure correct compensation when ACK thinning is enabled, a new variable is introduced to keep qlen unchanged.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerLinux
≫
Produkt
Linux
Default Statusunaffected
Version
de04ddd2980b48caa8d7e24a7db2742917a8b280
Version <
a3f4e3de41a3f115db35276c6b186ccbc913934a
Status
affected
Version
0dacfc5372e314d1219f03e64dde3ab495a5a25e
Version <
38abf6e931b169ea88d7529b49096f53a5dcf8fe
Status
affected
Version
710866fc0a64eafcb8bacd91bcb1329eb7e5035f
Version <
fcb91be52eb6e92e00b533ebd7c77fecada537e1
Status
affected
Version
aa12ee1c1bd260943fd6ab556d8635811c332eeb
Version <
d01f0e072dadb02fe10f436b940dd957aff0d7d4
Status
affected
Version
ff57186b2cc39766672c4c0332323933e5faaa88
Version <
0b6216f9b3d1c33c76f74511026e5de5385ee520
Status
affected
Version
15de71d06a400f7fdc15bf377a2552b0ec437cf5
Version <
529c284cc2815c8350860e9a31722050fe7117cb
Status
affected
Version
15de71d06a400f7fdc15bf377a2552b0ec437cf5
Version <
3ed6c458530a547ed0c9ea0b02b19bab620be88b
Status
affected
Version
15de71d06a400f7fdc15bf377a2552b0ec437cf5
Version <
9fefc78f7f02d71810776fdeb119a05a946a27cc
Status
affected
Version
7689ab22de36f8db19095f6bdf11f28cfde92f5c
Status
affected
Version
62d591dde4defb1333d202410609c4ddeae060b3
Status
affected
HerstellerLinux
≫
Produkt
Linux
Default Statusaffected
Version
6.17
Status
affected
Version
0
Version <
6.17
Status
unaffected
Version <=
5.10.*
Version
5.10.248
Status
unaffected
Version <=
5.15.*
Version
5.15.198
Status
unaffected
Version <=
6.1.*
Version
6.1.160
Status
unaffected
Version <=
6.6.*
Version
6.6.120
Status
unaffected
Version <=
6.12.*
Version
6.12.63
Status
unaffected
Version <=
6.17.*
Version
6.17.13
Status
unaffected
Version <=
6.18.*
Version
6.18.2
Status
unaffected
Version <=
*
Version
6.19
Status
unaffected
VulnDex Vulnerability Enrichment
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.05% | 0.152 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|