CVE-2025-38477

Published Jul 28, 2025

Last updated a month ago

Overview

AI description

Automated description summarized from trusted sources.

CVE-2025-38477 is a race condition vulnerability in the Linux kernel's Quick Fair Queueing (QFQ) scheduler. The vulnerability occurs when the 'agg' parameter is modified in `qfq_change_agg` (called during `qfq_enqueue`) while other threads concurrently access it. This can lead to a NULL pointer dereference in `qfq_dump_class` or a use-after-free condition in `qfq_delete_class`. The vulnerability impacts the network scheduling functionality and could lead to system crashes or denial of service. The issue is resolved by moving `qfq_destroy_class` into the critical section and adding `sch_tree_lock` protection to `qfq_dump_class` and `qfq_dump_class_stats` functions. The vulnerability can be triggered locally by users with CAP_NET_ADMIN privileges.

Description
In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_qfq: Fix race condition on qfq_aggregate A race condition can occur when 'agg' is modified in qfq_change_agg (called during qfq_enqueue) while other threads access it concurrently. For example, qfq_dump_class may trigger a NULL dereference, and qfq_delete_class may cause a use-after-free. This patch addresses the issue by: 1. Moved qfq_destroy_class into the critical section. 2. Added sch_tree_lock protection to qfq_dump_class and qfq_dump_class_stats.
Source
416baaa9-dc9f-4396-8d5f-8c081fb06d67
NVD status
Awaiting Analysis

Social media

Hype score
Not currently trending