CVE-2025-38108

In the Linux kernel, the following vulnerability has been resolved: net_sched: red: fix a race in __red_change() Gerrard Tai reported a race condition in RED, whenever SFQ perturb timer fires at the wrong time. The race is as follows: CPU 0 CPU 1 [1]: lock root [2]: qdisc_tree_flush_backlog() [3]: unlock root | | [5]: lock root | [6]: rehash | [7]: qdisc_tree_reduce_backlog() | [4]: qdisc_put() This can be abused to underflow a parent's qlen. Calling qdisc_purge_queue() instead of qdisc_tree_flush_backlog() should fix the race, because all packets will be purged from the qdisc before releasing the lock.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

16 Dec 2025, 17:02

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.0
References () https://git.kernel.org/stable/c/110a47efcf23438ff8d31dbd9c854fae2a48bf98 - () https://git.kernel.org/stable/c/110a47efcf23438ff8d31dbd9c854fae2a48bf98 - Patch
References () https://git.kernel.org/stable/c/2790c4ec481be45a80948d059cd7c9a06bc37493 - () https://git.kernel.org/stable/c/2790c4ec481be45a80948d059cd7c9a06bc37493 - Patch
References () https://git.kernel.org/stable/c/2a71924ca4af59ffc00f0444732b6cd54b153d0e - () https://git.kernel.org/stable/c/2a71924ca4af59ffc00f0444732b6cd54b153d0e - Patch
References () https://git.kernel.org/stable/c/444ad445df5496a785705019268a8a84b84484bb - () https://git.kernel.org/stable/c/444ad445df5496a785705019268a8a84b84484bb - Patch
References () https://git.kernel.org/stable/c/4b755305b2b0618e857fdadb499365b5f2e478d1 - () https://git.kernel.org/stable/c/4b755305b2b0618e857fdadb499365b5f2e478d1 - Patch
References () https://git.kernel.org/stable/c/85a3e0ede38450ea3053b8c45d28cf55208409b8 - () https://git.kernel.org/stable/c/85a3e0ede38450ea3053b8c45d28cf55208409b8 - Patch
References () https://git.kernel.org/stable/c/a1bf6a4e9264a685b0e642994031f9c5aad72414 - () https://git.kernel.org/stable/c/a1bf6a4e9264a685b0e642994031f9c5aad72414 - Patch
References () https://git.kernel.org/stable/c/f569984417a4e12c67366e69bdcb752970de921d - () https://git.kernel.org/stable/c/f569984417a4e12c67366e69bdcb752970de921d - Patch
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory, Mailing List
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory, Mailing List
CWE CWE-362

03 Nov 2025, 18:16

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net_sched: red: corrige una ejecución en __red_change() Gerrard Tai informó una condición de ejecución en RED, siempre que el temporizador de perturbación SFQ se dispara en el momento equivocado. La carrera es la siguiente: CPU 0 CPU 1 [1]: raíz de bloqueo [2]: qdisc_tree_flush_backlog() [3]: raíz de desbloqueo | | [5]: raíz de bloqueo | [6]: rehash | [7]: qdisc_tree_reduce_backlog() | [4]: qdisc_put() Esto se puede abusar para desbordar el qlen de un padre. Llamar a qdisc_purge_queue() en lugar de qdisc_tree_flush_backlog() debería corregir la ejecución, porque todos los paquetes se purgarán del qdisc antes de liberar el bloqueo.
References
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html -
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html -

03 Jul 2025, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-03 09:15

Updated : 2025-12-16 17:02


NVD link : CVE-2025-38108

Mitre link : CVE-2025-38108

CVE.ORG link : CVE-2025-38108


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')