U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2025-38107 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: net_sched: ets: fix a race in ets_qdisc_change() Gerrard Tai reported a race condition in ETS, whenever SFQ perturb timer fires at the wrong time. The race is as follows: CPU 0 CPU 1 [1]: lock root [2]: qdisc_tree_flush_backlog() [3]: unlock root | | [5]: lock root | [6]: rehash | [7]: qdisc_tree_reduce_backlog() | [4]: qdisc_put() This can be abused to underflow a parent's qlen. Calling qdisc_purge_queue() instead of qdisc_tree_flush_backlog() should fix the race, because all packets will be purged from the qdisc before releasing the lock.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

URL Source(s) Tag(s)
https://git.kernel.org/stable/c/0383b25488a545be168744336847549d4a2d3d6c kernel.org
https://git.kernel.org/stable/c/073f64c03516bcfaf790f8edc772e0cfb8a84ec3 kernel.org
https://git.kernel.org/stable/c/0b479d0aa488cb478eb2e1d8868be946ac8afb4f kernel.org
https://git.kernel.org/stable/c/347867cb424edae5fec1622712c8dd0a2c42918f kernel.org
https://git.kernel.org/stable/c/d92adacdd8c2960be856e0b82acc5b7c5395fddb kernel.org
https://git.kernel.org/stable/c/eb7b74e9754e1ba2088f914ad1f57a778b11894b kernel.org
https://git.kernel.org/stable/c/fed94bd51d62d2e0e006aa61480e94e5cd0582b0 kernel.org

Weakness Enumeration

CWE-ID CWE Name Source

Change History

1 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2025-38107
NVD Published Date:
07/03/2025
NVD Last Modified:
07/03/2025
Source:
kernel.org