CVE-2025-38468
BaseFortify
Publication date: 2025-07-28
Last updated on: 2025-11-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is in the Linux kernel's network scheduler (net/sched) subsystem. Specifically, the function htb_lookup_leaf triggers a BUG_ON error when it encounters an empty red-black tree (rbtree) during certain traffic control (tc) operations involving hierarchical token bucket (htb), netem, and blackhole queuing disciplines. The root cause is that when packets are dropped by the blackhole qdisc, the associated data structures become empty, leading to a NULL pointer scenario that causes the BUG_ON to trigger. The fix is to return NULL instead of triggering BUG_ON, preventing the kernel from crashing.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to hit a BUG_ON condition, which typically results in a kernel panic or crash. This can lead to denial of service on systems using the affected network scheduling features, potentially disrupting network traffic and system availability.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by running the sequence of commands that trigger the BUG_ON in the Linux kernel's htb_lookup_leaf function. The commands are: tc qdisc del dev lo root tc qdisc add dev lo root handle 1: htb default 1 tc class add dev lo parent 1: classid 1:1 htb rate 64bit tc qdisc add dev lo parent 1:1 handle 2: netem tc qdisc add dev lo parent 2:1 handle 3: blackhole ping -I lo -c1 -W0.001 127.0.0.1 If these commands cause a kernel BUG_ON or crash, the system is vulnerable.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version where the vulnerability is fixed by returning NULL instead of triggering BUG_ON in htb_lookup_leaf. Until then, avoid using the specific qdisc configuration sequence involving htb, netem, and blackhole on the loopback device that triggers the bug.