CVE-2025-38000
Severity CVSS v4.0:
Pending analysis
Type:
CWE-416
Use After Free
Publication date:
06/06/2025
Last modified:
16/12/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
sch_hfsc: Fix qlen accounting bug when using peek in hfsc_enqueue()<br />
<br />
When enqueuing the first packet to an HFSC class, hfsc_enqueue() calls the<br />
child qdisc&#39;s peek() operation before incrementing sch->q.qlen and<br />
sch->qstats.backlog. If the child qdisc uses qdisc_peek_dequeued(), this may<br />
trigger an immediate dequeue and potential packet drop. In such cases,<br />
qdisc_tree_reduce_backlog() is called, but the HFSC qdisc&#39;s qlen and backlog<br />
have not yet been updated, leading to inconsistent queue accounting. This<br />
can leave an empty HFSC class in the active list, causing further<br />
consequences like use-after-free.<br />
<br />
This patch fixes the bug by moving the increment of sch->q.qlen and<br />
sch->qstats.backlog before the call to the child qdisc&#39;s peek() operation.<br />
This ensures that queue length and backlog are always accurate when packet<br />
drops or dequeues are triggered during the peek.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 4.8 (including) | 5.4.294 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.238 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.185 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.141 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.93 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.31 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.14.9 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.15:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.15:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.15:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.15:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.15:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.15:rc7:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/1034e3310752e8675e313f7271b348914008719a
- https://git.kernel.org/stable/c/3f3a22eebbc32b4fa8ce9c1d5f9db214b45b9335
- https://git.kernel.org/stable/c/3f981138109f63232a5fb7165938d4c945cc1b9d
- https://git.kernel.org/stable/c/49b21795b8e5654a7df3d910a12e1060da4c04cf
- https://git.kernel.org/stable/c/89c301e929a0db14ebd94b4d97764ce1d6981653
- https://git.kernel.org/stable/c/93c276942e75de0e5bc91576300d292e968f5a02
- https://git.kernel.org/stable/c/f1dde3eb17dc1b8bd07aed00004b1e05fc87a3d4
- https://git.kernel.org/stable/c/f9f593e34d2fb67644372c8f7b033bdc622ad228
- https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html



