U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

CVE-2025-38477 Detail

Description

In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_qfq: Fix race condition on qfq_aggregate A race condition can occur when 'agg' is modified in qfq_change_agg (called during qfq_enqueue) while other threads access it concurrently. For example, qfq_dump_class may trigger a NULL dereference, and qfq_delete_class may cause a use-after-free. This patch addresses the issue by: 1. Moved qfq_destroy_class into the critical section. 2. Added sch_tree_lock protection to qfq_dump_class and qfq_dump_class_stats.


Metrics

NVD enrichment efforts reference publicly available information to associate vector strings. CVSS information contributed by other sources is also displayed.
CVSS 4.0 Severity and Vector Strings:

NIST CVSS score
NIST: NVD
N/A
NVD assessment not yet provided.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

URL Source(s) Tag(s)
https://git.kernel.org/stable/c/466e10194ab81caa2ee6a332d33ba16bcceeeba6 kernel.org
https://git.kernel.org/stable/c/5e28d5a3f774f118896aec17a3a20a9c5c9dfc64 kernel.org
https://git.kernel.org/stable/c/a6d735100f602c830c16d69fb6d780eebd8c9ae1 kernel.org
https://git.kernel.org/stable/c/aa7a22c4d678bf649fd3a1d27debec583563414d kernel.org
https://git.kernel.org/stable/c/c000a3a330d97f6c073ace5aa5faf94b9adb4b79 kernel.org
https://git.kernel.org/stable/c/c6df794000147a3a02f79984aada4ce83f8d0a1e kernel.org
https://git.kernel.org/stable/c/d841aa5518508ab195b6781ad0d73ee378d713dd kernel.org
https://git.kernel.org/stable/c/fbe48f06e64134dfeafa89ad23387f66ebca3527 kernel.org

Weakness Enumeration

CWE-ID CWE Name Source

Change History

2 change records found show changes

Quick Info

CVE Dictionary Entry:
CVE-2025-38477
NVD Published Date:
07/28/2025
NVD Last Modified:
08/28/2025
Source:
kernel.org