๐Ÿ” CVE Alert

CVE-2025-38477

UNKNOWN 0.0

net/sched: sch_qfq: Fix race condition on qfq_aggregate

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_qfq: Fix race condition on qfq_aggregate A race condition can occur when 'agg' is modified in qfq_change_agg (called during qfq_enqueue) while other threads access it concurrently. For example, qfq_dump_class may trigger a NULL dereference, and qfq_delete_class may cause a use-after-free. This patch addresses the issue by: 1. Moved qfq_destroy_class into the critical section. 2. Added sch_tree_lock protection to qfq_dump_class and qfq_dump_class_stats.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Jul 28, 2025
Last Updated May 12, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
462dbc9101acd38e92eda93c0726857517a24bbd < aa7a22c4d678bf649fd3a1d27debec583563414d 462dbc9101acd38e92eda93c0726857517a24bbd < d841aa5518508ab195b6781ad0d73ee378d713dd 462dbc9101acd38e92eda93c0726857517a24bbd < c6df794000147a3a02f79984aada4ce83f8d0a1e 462dbc9101acd38e92eda93c0726857517a24bbd < 466e10194ab81caa2ee6a332d33ba16bcceeeba6 462dbc9101acd38e92eda93c0726857517a24bbd < fbe48f06e64134dfeafa89ad23387f66ebca3527 462dbc9101acd38e92eda93c0726857517a24bbd < a6d735100f602c830c16d69fb6d780eebd8c9ae1 462dbc9101acd38e92eda93c0726857517a24bbd < c000a3a330d97f6c073ace5aa5faf94b9adb4b79 462dbc9101acd38e92eda93c0726857517a24bbd < 5e28d5a3f774f118896aec17a3a20a9c5c9dfc64
Linux / Linux
3.8

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/aa7a22c4d678bf649fd3a1d27debec583563414d git.kernel.org: https://git.kernel.org/stable/c/d841aa5518508ab195b6781ad0d73ee378d713dd git.kernel.org: https://git.kernel.org/stable/c/c6df794000147a3a02f79984aada4ce83f8d0a1e git.kernel.org: https://git.kernel.org/stable/c/466e10194ab81caa2ee6a332d33ba16bcceeeba6 git.kernel.org: https://git.kernel.org/stable/c/fbe48f06e64134dfeafa89ad23387f66ebca3527 git.kernel.org: https://git.kernel.org/stable/c/a6d735100f602c830c16d69fb6d780eebd8c9ae1 git.kernel.org: https://git.kernel.org/stable/c/c000a3a330d97f6c073ace5aa5faf94b9adb4b79 git.kernel.org: https://git.kernel.org/stable/c/5e28d5a3f774f118896aec17a3a20a9c5c9dfc64 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-082556.html