CVE-2025-38553
BaseFortify
Publication date: 2025-08-19
Last updated on: 2025-11-03
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | kernel | 6.1.153 |
| linux | kernel | 5.10.244 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's network scheduler (net/sched) where the duplication prevention logic in netem_enqueue breaks when a netem (network emulator) exists in a queuing discipline (qdisc) tree with other netems. This can cause a soft lockup and an out-of-memory (OOM) loop in netem_dequeue. The root cause is that duplicating netems should not coexist in the same qdisc tree, and the fix ensures that a duplicating netem cannot be added to a tree that already contains other netems.
How can this vulnerability impact me? :
If exploited, this vulnerability can cause the system to experience a soft lockup and enter an out-of-memory loop, potentially leading to degraded system performance or denial of service due to resource exhaustion in the network stack.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, ensure that a duplicating netem cannot exist in a qdisc tree with other netems. This involves restricting the conditions for adding duplicating netems to the qdisc tree to prevent soft lockups and OOM loops. Applying the updated Linux kernel patch that enforces this restriction is recommended.