In the Linux kernel, the following vulnerability has been resolved:
sch_hfsc: Fix qlen accounting bug when using peek in hfsc_enqueue()
When enqueuing the first packet to an HFSC class, hfsc_enqueue() calls the
child qdisc's peek() operation before incrementing sch->q.qlen and
sch->qstats.backlog. If the child qdisc uses qdisc_peek_dequeued(), this may
trigger an immediate dequeue and potential packet drop. In such cases,
qdisc_tree_reduce_backlog() is called, but the HFSC qdisc's qlen and backlog
have not yet been updated, leading to inconsistent queue accounting. This
can leave an empty HFSC class in the active list, causing further
consequences like use-after-free.
This patch fixes the bug by moving the increment of sch->q.qlen and
sch->qstats.backlog before the call to the child qdisc's peek() operation.
This ensures that queue length and backlog are always accurate when packet
drops or dequeues are triggered during the peek.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
16 Dec 2025, 20:21
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-416 | |
| First Time |
Linux
Debian Debian debian Linux Linux linux Kernel |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
| CPE | cpe:2.3:o:linux:linux_kernel:6.15:rc7:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.15:rc5:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.15:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.15:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.15:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.15:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:* |
|
| References | () https://git.kernel.org/stable/c/1034e3310752e8675e313f7271b348914008719a - Patch | |
| References | () https://git.kernel.org/stable/c/3f3a22eebbc32b4fa8ce9c1d5f9db214b45b9335 - Patch | |
| References | () https://git.kernel.org/stable/c/3f981138109f63232a5fb7165938d4c945cc1b9d - Patch | |
| References | () https://git.kernel.org/stable/c/49b21795b8e5654a7df3d910a12e1060da4c04cf - Patch | |
| References | () https://git.kernel.org/stable/c/89c301e929a0db14ebd94b4d97764ce1d6981653 - Patch | |
| References | () https://git.kernel.org/stable/c/93c276942e75de0e5bc91576300d292e968f5a02 - Patch | |
| References | () https://git.kernel.org/stable/c/f1dde3eb17dc1b8bd07aed00004b1e05fc87a3d4 - Patch | |
| References | () https://git.kernel.org/stable/c/f9f593e34d2fb67644372c8f7b033bdc622ad228 - Patch | |
| References | () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory | |
| References | () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory |
03 Nov 2025, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| Summary |
|
06 Jun 2025, 13:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-06-06 13:15
Updated : 2025-12-16 20:21
NVD link : CVE-2025-38000
Mitre link : CVE-2025-38000
CVE.ORG link : CVE-2025-38000
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-416
Use After Free
