CVE-2025-38193

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-38193
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-38193.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-38193
Downstream
Related
Published
2025-07-04T14:15:26Z
Modified
2025-08-28T15:15:48Z
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved:

netsched: schsfq: reject invalid perturb period

Gerrard Tai reported that SFQ perturb_period has no range check yet, and this can be used to trigger a race condition fixed in a separate patch.

We want to make sure ctl->perturb_period * HZ will not overflow and is positive.

tc qd add dev lo root sfq perturb -10 # negative value : error Error: sch_sfq: invalid perturb period.

tc qd add dev lo root sfq perturb 1000000000 # too big : error Error: sch_sfq: invalid perturb period.

tc qd add dev lo root sfq perturb 2000000 # acceptable value tc -s -d qd sh dev lo qdisc sfq 8005: root refcnt 2 limit 127p quantum 64Kb depth 127 flows 128 divisor 1024 perturb 2000000sec Sent 0 bytes 0 pkt (dropped 0, overlimits 0 requeues 0) backlog 0b 0p requeues 0

References

Affected packages