CVE-2025-38637

In the Linux kernel, the following vulnerability has been resolved: net_sched: skbprio: Remove overly strict queue assertions In the current implementation, skbprio enqueue/dequeue contains an assertion that fails under certain conditions when SKBPRIO is used as a child qdisc under TBF with specific parameters. The failure occurs because TBF sometimes peeks at packets in the child qdisc without actually dequeuing them when tokens are unavailable. This peek operation creates a discrepancy between the parent and child qdisc queue length counters. When TBF later receives a high-priority packet, SKBPRIO's queue length may show a different value than what's reflected in its internal priority queue tracking, triggering the assertion. The fix removes this overly strict assertions in SKBPRIO, they are not necessary at all.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

06 Nov 2025, 21:35

Type Values Removed Values Added
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel
CWE CWE-617
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/034b293bf17c124fec0f0e663f81203b00aa7a50 - () https://git.kernel.org/stable/c/034b293bf17c124fec0f0e663f81203b00aa7a50 - Patch
References () https://git.kernel.org/stable/c/1284733bab736e598341f1d3f3b94e2a322864a8 - () https://git.kernel.org/stable/c/1284733bab736e598341f1d3f3b94e2a322864a8 - Patch
References () https://git.kernel.org/stable/c/1dcc144c322a8d526b791135604c0663f1af9d85 - () https://git.kernel.org/stable/c/1dcc144c322a8d526b791135604c0663f1af9d85 - Patch
References () https://git.kernel.org/stable/c/2286770b07cb5268c03d11274b8efd43dff0d380 - () https://git.kernel.org/stable/c/2286770b07cb5268c03d11274b8efd43dff0d380 - Patch
References () https://git.kernel.org/stable/c/2f35b7673a3aa3d09b3eb05811669622ebaa98ca - () https://git.kernel.org/stable/c/2f35b7673a3aa3d09b3eb05811669622ebaa98ca - Patch
References () https://git.kernel.org/stable/c/32ee79682315e6d3c99947b3f38b078a09a66919 - () https://git.kernel.org/stable/c/32ee79682315e6d3c99947b3f38b078a09a66919 - Patch
References () https://git.kernel.org/stable/c/7abc8318ce0712182bf0783dcfdd9a6a8331160e - () https://git.kernel.org/stable/c/7abc8318ce0712182bf0783dcfdd9a6a8331160e - Patch
References () https://git.kernel.org/stable/c/864ca690ff135078d374bd565b9872f161c614bc - () https://git.kernel.org/stable/c/864ca690ff135078d374bd565b9872f161c614bc - Patch
References () https://git.kernel.org/stable/c/ce8fe975fd99b49c29c42e50f2441ba53112b2e8 - () https://git.kernel.org/stable/c/ce8fe975fd99b49c29c42e50f2441ba53112b2e8 - Patch
References () https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html - () https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html - Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html - () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html - Third Party Advisory

03 Nov 2025, 20:18

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net_sched: skbprio: eliminar aserciones de cola demasiado estrictas En la implementación actual, skbprio enqueue/dequeue contiene una aserción que falla bajo ciertas condiciones cuando SKBPRIO se usa como una qdisc secundaria bajo TBF con parámetros específicos. El fallo se produce porque TBF a veces echa un vistazo a los paquetes en la qdisc secundaria sin realmente sacarlos de la cola cuando los tokens no están disponibles. Esta operación de vistazo crea una discrepancia entre los contadores de longitud de cola de la qdisc primaria y secundaria. Cuando TBF recibe posteriormente un paquete de alta prioridad, la longitud de cola de SKBPRIO puede mostrar un valor diferente al que se refleja en su seguimiento interno de cola de prioridad, lo que activa la aserción. La corrección elimina estas aserciones demasiado estrictas en SKBPRIO, no son necesarias en absoluto.
References
  • () https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html -
  • () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html -

18 Apr 2025, 07:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-18 07:15

Updated : 2025-11-06 21:35


NVD link : CVE-2025-38637

Mitre link : CVE-2025-38637

CVE.ORG link : CVE-2025-38637


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-617

Reachable Assertion