CVE-2025-38457
BaseFortify
Publication date: 2025-07-25
Last updated on: 2025-11-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an ancient bug in the Linux kernel's qdisc (queueing discipline) API. When a user tries to create or modify a qdisc specifying a parent qdisc that does not exist, the system attempts to graft the new qdisc after the creation callback has already run. Some qdiscs (like fq, hhf, choke) call a function that assumes the parent class exists, but if it doesn't, this leads to a failure because the code unconditionally calls a notification function on a null class. The patch fixes this by making the lookup for the parent class fail earlier, aborting the operation before the problematic qdisc creation happens.
How can this vulnerability impact me? :
This vulnerability can cause failures or unexpected behavior in the Linux kernel's network traffic control subsystem when manipulating qdiscs with invalid parent references. It may lead to kernel errors or instability when certain qdiscs are created or modified incorrectly, potentially affecting network performance or reliability.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by attempting to create or modify qdiscs with invalid parent classes, similar to the example commands that trigger the issue. For instance, running the following commands on a Linux system may reveal the vulnerability if it is present: sudo tc qdisc add dev lo root handle a: htb default 2 sudo tc qdisc add dev lo parent a: handle beef fq If the system fails or behaves unexpectedly during these commands, it may indicate the presence of the vulnerability.
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation is to apply the patch that ensures qdisc_leaf() returns failure when the parent class does not exist, thereby aborting the qdisc modification early. Until the patch is applied, avoid creating or modifying qdiscs with invalid or non-existent parent classes to prevent triggering the vulnerability.