๐Ÿ” CVE Alert

CVE-2025-39766

UNKNOWN 0.0

net/sched: Make cake_enqueue return NET_XMIT_CN when past buffer_limit

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: net/sched: Make cake_enqueue return NET_XMIT_CN when past buffer_limit The following setup can trigger a WARNING in htb_activate due to the condition: !cl->leaf.q->q.qlen tc qdisc del dev lo root tc qdisc add dev lo root handle 1: htb default 1 tc class add dev lo parent 1: classid 1:1 \ htb rate 64bit tc qdisc add dev lo parent 1:1 handle f: \ cake memlimit 1b ping -I lo -f -c1 -s64 -W0.001 127.0.0.1 This is because the low memlimit leads to a low buffer_limit, which causes packet dropping. However, cake_enqueue still returns NET_XMIT_SUCCESS, causing htb_enqueue to call htb_activate with an empty child qdisc. We should return NET_XMIT_CN when packets are dropped from the same tin and flow. I do not believe return value of NET_XMIT_CN is necessary for packet drops in the case of ack filtering, as that is meant to optimize performance, not to signal congestion.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published Sep 11, 2025
Last Updated May 12, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
046f6fd5daefac7f5abdafb436b30f63bc7c602b < 7689ab22de36f8db19095f6bdf11f28cfde92f5c 046f6fd5daefac7f5abdafb436b30f63bc7c602b < de04ddd2980b48caa8d7e24a7db2742917a8b280 046f6fd5daefac7f5abdafb436b30f63bc7c602b < 0dacfc5372e314d1219f03e64dde3ab495a5a25e 046f6fd5daefac7f5abdafb436b30f63bc7c602b < 710866fc0a64eafcb8bacd91bcb1329eb7e5035f 046f6fd5daefac7f5abdafb436b30f63bc7c602b < aa12ee1c1bd260943fd6ab556d8635811c332eeb 046f6fd5daefac7f5abdafb436b30f63bc7c602b < ff57186b2cc39766672c4c0332323933e5faaa88 046f6fd5daefac7f5abdafb436b30f63bc7c602b < 62d591dde4defb1333d202410609c4ddeae060b3 046f6fd5daefac7f5abdafb436b30f63bc7c602b < 15de71d06a400f7fdc15bf377a2552b0ec437cf5
Linux / Linux
4.19

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/7689ab22de36f8db19095f6bdf11f28cfde92f5c git.kernel.org: https://git.kernel.org/stable/c/de04ddd2980b48caa8d7e24a7db2742917a8b280 git.kernel.org: https://git.kernel.org/stable/c/0dacfc5372e314d1219f03e64dde3ab495a5a25e git.kernel.org: https://git.kernel.org/stable/c/710866fc0a64eafcb8bacd91bcb1329eb7e5035f git.kernel.org: https://git.kernel.org/stable/c/aa12ee1c1bd260943fd6ab556d8635811c332eeb git.kernel.org: https://git.kernel.org/stable/c/ff57186b2cc39766672c4c0332323933e5faaa88 git.kernel.org: https://git.kernel.org/stable/c/62d591dde4defb1333d202410609c4ddeae060b3 git.kernel.org: https://git.kernel.org/stable/c/15de71d06a400f7fdc15bf377a2552b0ec437cf5 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html cert-portal.siemens.com: https://cert-portal.siemens.com/productcert/html/ssa-032379.html