CVE-2025-38193
04.07.2025, 14:15
In the Linux kernel, the following vulnerability has been resolved: net_sched: sch_sfq: reject invalid perturb period Gerrard Tai reported that SFQ perturb_period has no range check yet, and this can be used to trigger a race condition fixed in a separate patch. We want to make sure ctl->perturb_period * HZ will not overflow and is positive. tc qd add dev lo root sfq perturb -10 # negative value : error Error: sch_sfq: invalid perturb period. tc qd add dev lo root sfq perturb 1000000000 # too big : error Error: sch_sfq: invalid perturb period. tc qd add dev lo root sfq perturb 2000000 # acceptable value tc -s -d qd sh dev lo qdisc sfq 8005: root refcnt 2 limit 127p quantum 64Kb depth 127 flows 128 divisor 1024 perturb 2000000sec Sent 0 bytes 0 pkt (dropped 0, overlimits 0 requeues 0) backlog 0b 0p requeues 0Enginsight
| Vendor | Product | Version |
|---|---|---|
| linux | linux_kernel | 2.6.13 ≤ 𝑥 < 5.4.297 |
| linux | linux_kernel | 5.5 ≤ 𝑥 < 5.10.240 |
| linux | linux_kernel | 5.11 ≤ 𝑥 < 5.15.186 |
| linux | linux_kernel | 5.16 ≤ 𝑥 < 6.1.142 |
| linux | linux_kernel | 6.2 ≤ 𝑥 < 6.6.95 |
| linux | linux_kernel | 6.7 ≤ 𝑥 < 6.12.35 |
| linux | linux_kernel | 6.13 ≤ 𝑥 < 6.15.4 |
| linux | linux_kernel | 2.6.12 |
| linux | linux_kernel | 2.6.12:rc2 |
| linux | linux_kernel | 2.6.12:rc3 |
| linux | linux_kernel | 2.6.12:rc4 |
| linux | linux_kernel | 2.6.12:rc5 |
| linux | linux_kernel | 6.16:rc1 |
| debian | debian_linux | 11.0 |
𝑥
= Vulnerable software versions
Debian Releases
References