CVE-2025-38553

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-38553
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-38553.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-38553
Downstream
Related
Published
2025-08-19T06:06:53.204Z
Modified
2025-11-28T02:35:42.171867Z
Summary
net/sched: Restrict conditions for adding duplicating netems to qdisc tree
Details

In the Linux kernel, the following vulnerability has been resolved:

net/sched: Restrict conditions for adding duplicating netems to qdisc tree

netemenqueue's duplication prevention logic breaks when a netem resides in a qdisc tree with other netems - this can lead to a soft lockup and OOM loop in netemdequeue, as seen in [1]. Ensure that a duplicating netem cannot exist in a tree with other netems.

Previous approaches suggested in discussions in chronological order:

1) Track duplication status or ttl in the sk_buff struct. Considered too specific a use case to extend such a struct, though this would be a resilient fix and address other previous and potential future DOS bugs like the one described in loopy fun [2].

2) Restrict netemenqueue recursion depth like in actmirred with a per cpu variable. However, netem_dequeue can call enqueue on its child, and the depth restriction could be bypassed if the child is a netem.

3) Use the same approach as in 2, but add metadata in netemskbcb to handle the netem_dequeue case and track a packet's involvement in duplication. This is an overly complex approach, and Jamal notes that the skb cb can be overwritten to circumvent this safeguard.

4) Prevent the addition of a netem to a qdisc tree if its ancestral path contains a netem. However, filters and actions can cause a packet to change paths when re-enqueued to the root from netem duplication, leading us to the current solution: prevent a duplicating netem from inhabiting the same tree as other netems.

[1] https://lore.kernel.org/netdev/8DuRWwfqjoRDLDmBMlIfbrsZg9Gx50DHJc1ilxsEBNe2D6NMoigReIRIG0LOjMc3r10nUUZtArXx4oZBIdUfZQrwjcQhdinnMis0G7VEk=@willsroot.io/ [2] https://lwn.net/Articles/719297/

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/38xxx/CVE-2025-38553.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
0afb51e72855971dba83b3c6b70c547c2d1161fd
Fixed
ad340a4b4adb855b18b3666f26ad65c8968e2deb
Fixed
f088b6ebe8797a3f948d2cae47f34bfb45cc6522
Fixed
cab2809944989889f88a1a8b5cff1c78460c72cb
Fixed
325f5ec67cc0a77f2d0d453445b9857f1cd06c76
Fixed
103c4e27ec9f5fe53022e46e976abf52c7221baf
Fixed
795cb393e38977aa991e70a9363da0ee734b2114
Fixed
250f8796006c0f2bc638ce545f601d49ae8d528b
Fixed
09317dfb681ac5a96fc69bea0c54441cf91b8270
Fixed
ec8e0e3d7adef940cdf9475e2352c0680189d14e

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.6.12
Fixed
5.4.297
Type
ECOSYSTEM
Events
Introduced
5.5.0
Fixed
5.10.241
Type
ECOSYSTEM
Events
Introduced
5.11.0
Fixed
5.15.190
Type
ECOSYSTEM
Events
Introduced
5.16.0
Fixed
6.1.148
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.102
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.42
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.15.10
Type
ECOSYSTEM
Events
Introduced
6.16.0
Fixed
6.16.1