CVE-2025-38684

Severity CVSS v4.0:
Pending analysis
Type:
CWE-476 NULL Pointer Dereference
Publication date:
04/09/2025
Last modified:
08/01/2026

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net/sched: ets: use old &amp;#39;nbands&amp;#39; while purging unused classes<br /> <br /> Shuang reported sch_ets test-case [1] crashing in ets_class_qlen_notify()<br /> after recent changes from Lion [2]. The problem is: in ets_qdisc_change()<br /> we purge unused DWRR queues; the value of &amp;#39;q-&gt;nbands&amp;#39; is the new one, and<br /> the cleanup should be done with the old one. The problem is here since my<br /> first attempts to fix ets_qdisc_change(), but it surfaced again after the<br /> recent qdisc len accounting fixes. Fix it purging idle DWRR queues before<br /> assigning a new value of &amp;#39;q-&gt;nbands&amp;#39;, so that all purge operations find a<br /> consistent configuration:<br /> <br /> - old &amp;#39;q-&gt;nbands&amp;#39; because it&amp;#39;s needed by ets_class_find()<br /> - old &amp;#39;q-&gt;nstrict&amp;#39; because it&amp;#39;s needed by ets_class_is_strict()<br /> <br /> BUG: kernel NULL pointer dereference, address: 0000000000000000<br /> #PF: supervisor read access in kernel mode<br /> #PF: error_code(0x0000) - not-present page<br /> PGD 0 P4D 0<br /> Oops: Oops: 0000 [#1] SMP NOPTI<br /> CPU: 62 UID: 0 PID: 39457 Comm: tc Kdump: loaded Not tainted 6.12.0-116.el10.x86_64 #1 PREEMPT(voluntary)<br /> Hardware name: Dell Inc. PowerEdge R640/06DKY5, BIOS 2.12.2 07/09/2021<br /> RIP: 0010:__list_del_entry_valid_or_report+0x4/0x80<br /> Code: ff 4c 39 c7 0f 84 39 19 8e ff b8 01 00 00 00 c3 cc cc cc cc 66 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 8b 17 48 8b 4f 08 48 85 d2 0f 84 56 19 8e ff 48 85 c9 0f 84 ab<br /> RSP: 0018:ffffba186009f400 EFLAGS: 00010202<br /> RAX: 00000000000000d6 RBX: 0000000000000000 RCX: 0000000000000004<br /> RDX: ffff9f0fa29b69c0 RSI: 0000000000000000 RDI: 0000000000000000<br /> RBP: ffffffffc12c2400 R08: 0000000000000008 R09: 0000000000000004<br /> R10: ffffffffffffffff R11: 0000000000000004 R12: 0000000000000000<br /> R13: ffff9f0f8cfe0000 R14: 0000000000100005 R15: 0000000000000000<br /> FS: 00007f2154f37480(0000) GS:ffff9f269c1c0000(0000) knlGS:0000000000000000<br /> CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br /> CR2: 0000000000000000 CR3: 00000001530be001 CR4: 00000000007726f0<br /> DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000<br /> DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400<br /> PKRU: 55555554<br /> Call Trace:<br /> <br /> ets_class_qlen_notify+0x65/0x90 [sch_ets]<br /> qdisc_tree_reduce_backlog+0x74/0x110<br /> ets_qdisc_change+0x630/0xa40 [sch_ets]<br /> __tc_modify_qdisc.constprop.0+0x216/0x7f0<br /> tc_modify_qdisc+0x7c/0x120<br /> rtnetlink_rcv_msg+0x145/0x3f0<br /> netlink_rcv_skb+0x53/0x100<br /> netlink_unicast+0x245/0x390<br /> netlink_sendmsg+0x21b/0x470<br /> ____sys_sendmsg+0x39d/0x3d0<br /> ___sys_sendmsg+0x9a/0xe0<br /> __sys_sendmsg+0x7a/0xd0<br /> do_syscall_64+0x7d/0x160<br /> entry_SYSCALL_64_after_hwframe+0x76/0x7e<br /> RIP: 0033:0x7f2155114084<br /> Code: 89 02 b8 ff ff ff ff eb bb 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 f3 0f 1e fa 80 3d 25 f0 0c 00 00 74 13 b8 2e 00 00 00 0f 05 3d 00 f0 ff ff 77 54 c3 0f 1f 00 48 83 ec 28 89 54 24 1c 48 89<br /> RSP: 002b:00007fff1fd7a988 EFLAGS: 00000202 ORIG_RAX: 000000000000002e<br /> RAX: ffffffffffffffda RBX: 0000560ec063e5e0 RCX: 00007f2155114084<br /> RDX: 0000000000000000 RSI: 00007fff1fd7a9f0 RDI: 0000000000000003<br /> RBP: 00007fff1fd7aa60 R08: 0000000000000010 R09: 000000000000003f<br /> R10: 0000560ee9b3a010 R11: 0000000000000202 R12: 00007fff1fd7aae0<br /> R13: 000000006891ccde R14: 0000560ec063e5e0 R15: 00007fff1fd7aad0<br /> <br /> <br /> [1] https://lore.kernel.org/netdev/e08c7f4a6882f260011909a868311c6e9b54f3e4.1639153474.git.dcaratti@redhat.com/<br /> [2] https://lore.kernel.org/netdev/d912cbd7-193b-4269-9857-525bee8bbb6a@gmail.com/

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.4.296 (including) 5.5 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.6 (including) 5.10.241 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.11 (including) 5.15.190 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.16 (including) 6.1.149 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.103 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.12.43 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.13 (including) 6.15.11 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.16 (including) 6.16.2 (excluding)
cpe:2.3:o:linux:linux_kernel:6.17:rc1:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*