In the Linux kernel, the following vulnerability has been resolved:
net_sched: skbprio: Remove overly strict queue assertions
In the current implementation, skbprio enqueue/dequeue contains an assertion
that fails under certain conditions when SKBPRIO is used as a child qdisc under
TBF with specific parameters. The failure occurs because TBF sometimes peeks at
packets in the child qdisc without actually dequeuing them when tokens are
unavailable.
This peek operation creates a discrepancy between the parent and child qdisc
queue length counters. When TBF later receives a high-priority packet,
SKBPRIO's queue length may show a different value than what's reflected in its
internal priority queue tracking, triggering the assertion.
The fix removes this overly strict assertions in SKBPRIO, they are not
necessary at all.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
06 Nov 2025, 21:35
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Linux
Debian Debian debian Linux Linux linux Kernel |
|
| CWE | CWE-617 | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| CPE | cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
|
| References | () https://git.kernel.org/stable/c/034b293bf17c124fec0f0e663f81203b00aa7a50 - Patch | |
| References | () https://git.kernel.org/stable/c/1284733bab736e598341f1d3f3b94e2a322864a8 - Patch | |
| References | () https://git.kernel.org/stable/c/1dcc144c322a8d526b791135604c0663f1af9d85 - Patch | |
| References | () https://git.kernel.org/stable/c/2286770b07cb5268c03d11274b8efd43dff0d380 - Patch | |
| References | () https://git.kernel.org/stable/c/2f35b7673a3aa3d09b3eb05811669622ebaa98ca - Patch | |
| References | () https://git.kernel.org/stable/c/32ee79682315e6d3c99947b3f38b078a09a66919 - Patch | |
| References | () https://git.kernel.org/stable/c/7abc8318ce0712182bf0783dcfdd9a6a8331160e - Patch | |
| References | () https://git.kernel.org/stable/c/864ca690ff135078d374bd565b9872f161c614bc - Patch | |
| References | () https://git.kernel.org/stable/c/ce8fe975fd99b49c29c42e50f2441ba53112b2e8 - Patch | |
| References | () https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html - Third Party Advisory | |
| References | () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html - Third Party Advisory |
03 Nov 2025, 20:18
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| References |
|
18 Apr 2025, 07:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-04-18 07:15
Updated : 2025-11-06 21:35
NVD link : CVE-2025-38637
Mitre link : CVE-2025-38637
CVE.ORG link : CVE-2025-38637
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-617
Reachable Assertion
