CVE-2025-38553
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
19/08/2025
Last modified:
08/01/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
net/sched: Restrict conditions for adding duplicating netems to qdisc tree<br />
<br />
netem_enqueue&#39;s duplication prevention logic breaks when a netem<br />
resides in a qdisc tree with other netems - this can lead to a<br />
soft lockup and OOM loop in netem_dequeue, as seen in [1].<br />
Ensure that a duplicating netem cannot exist in a tree with other<br />
netems.<br />
<br />
Previous approaches suggested in discussions in chronological order:<br />
<br />
1) Track duplication status or ttl in the sk_buff struct. Considered<br />
too specific a use case to extend such a struct, though this would<br />
be a resilient fix and address other previous and potential future<br />
DOS bugs like the one described in loopy fun [2].<br />
<br />
2) Restrict netem_enqueue recursion depth like in act_mirred with a<br />
per cpu variable. However, netem_dequeue can call enqueue on its<br />
child, and the depth restriction could be bypassed if the child is a<br />
netem.<br />
<br />
3) Use the same approach as in 2, but add metadata in netem_skb_cb<br />
to handle the netem_dequeue case and track a packet&#39;s involvement<br />
in duplication. This is an overly complex approach, and Jamal<br />
notes that the skb cb can be overwritten to circumvent this<br />
safeguard.<br />
<br />
4) Prevent the addition of a netem to a qdisc tree if its ancestral<br />
path contains a netem. However, filters and actions can cause a<br />
packet to change paths when re-enqueued to the root from netem<br />
duplication, leading us to the current solution: prevent a<br />
duplicating netem from inhabiting the same tree as other netems.<br />
<br />
[1] https://lore.kernel.org/netdev/8DuRWwfqjoRDLDmBMlIfbrsZg9Gx50DHJc1ilxsEBNe2D6NMoigR_eIRIG0LOjMc3r10nUUZtArXx4oZBIdUfZQrwjcQhdinnMis_0G7VEk=@willsroot.io/<br />
[2] https://lwn.net/Articles/719297/
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 2.6.13 (including) | 5.4.297 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.241 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.190 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.148 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.102 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.42 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.15.10 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.16 (including) | 6.16.1 (excluding) |
| cpe:2.3:o:linux:linux_kernel:2.6.12:-:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/09317dfb681ac5a96fc69bea0c54441cf91b8270
- https://git.kernel.org/stable/c/103c4e27ec9f5fe53022e46e976abf52c7221baf
- https://git.kernel.org/stable/c/250f8796006c0f2bc638ce545f601d49ae8d528b
- https://git.kernel.org/stable/c/325f5ec67cc0a77f2d0d453445b9857f1cd06c76
- https://git.kernel.org/stable/c/795cb393e38977aa991e70a9363da0ee734b2114
- https://git.kernel.org/stable/c/ad340a4b4adb855b18b3666f26ad65c8968e2deb
- https://git.kernel.org/stable/c/cab2809944989889f88a1a8b5cff1c78460c72cb
- https://git.kernel.org/stable/c/ec8e0e3d7adef940cdf9475e2352c0680189d14e
- https://git.kernel.org/stable/c/f088b6ebe8797a3f948d2cae47f34bfb45cc6522
- https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html



