CVE-2025-38568

In the Linux kernel, the following vulnerability has been resolved: net/sched: mqprio: fix stack out-of-bounds write in tc entry parsing TCA_MQPRIO_TC_ENTRY_INDEX is validated using NLA_POLICY_MAX(NLA_U32, TC_QOPT_MAX_QUEUE), which allows the value TC_QOPT_MAX_QUEUE (16). This leads to a 4-byte out-of-bounds stack write in the fp[] array, which only has room for 16 elements (0–15). Fix this by changing the policy to allow only up to TC_QOPT_MAX_QUEUE - 1.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

26 Nov 2025, 20:04

Type Values Removed Values Added
CWE CWE-787
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
First Time Linux linux Kernel
Linux
References () https://git.kernel.org/stable/c/39491e859fd494d0b51adc5c7d54c8a7dcf1d198 - () https://git.kernel.org/stable/c/39491e859fd494d0b51adc5c7d54c8a7dcf1d198 - Patch
References () https://git.kernel.org/stable/c/66fc2ebdd9d5dd6e5a9c7edeace5a61a0ab2cd86 - () https://git.kernel.org/stable/c/66fc2ebdd9d5dd6e5a9c7edeace5a61a0ab2cd86 - Patch
References () https://git.kernel.org/stable/c/d00e4125680f7074c4f42ce3c297336f23128e70 - () https://git.kernel.org/stable/c/d00e4125680f7074c4f42ce3c297336f23128e70 - Patch
References () https://git.kernel.org/stable/c/f1a9dbcb7d17bf0abb325cdc984957cfabc59693 - () https://git.kernel.org/stable/c/f1a9dbcb7d17bf0abb325cdc984957cfabc59693 - Patch
References () https://git.kernel.org/stable/c/ffd2dc4c6c49ff4f1e5d34e454a6a55608104c17 - () https://git.kernel.org/stable/c/ffd2dc4c6c49ff4f1e5d34e454a6a55608104c17 - Patch

Information

Published : 2025-08-19 17:15

Updated : 2025-11-26 20:04


NVD link : CVE-2025-38568

Mitre link : CVE-2025-38568

CVE.ORG link : CVE-2025-38568


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-787

Out-of-bounds Write