In the Linux kernel, the following vulnerability has been resolved:
net_sched: skbprio: Remove overly strict queue assertions
In the current implementation, skbprio enqueue/dequeue contains an assertion
that fails under certain conditions when SKBPRIO is used as a child qdisc under
TBF with specific parameters. The failure occurs because TBF sometimes peeks at
packets in the child qdisc without actually dequeuing them when tokens are
unavailable.
This peek operation creates a discrepancy between the parent and child qdisc
queue length counters. When TBF later receives a high-priority packet,
SKBPRIO's queue length may show a different value than what's reflected in its
internal priority queue tracking, triggering the assertion.
The fix removes this overly strict assertions in SKBPRIO, they are not
necessary at all.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
06 Nov 2025, 21:35
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Linux linux Kernel
Debian Debian debian Linux Linux |
|
| References | () https://git.kernel.org/stable/c/034b293bf17c124fec0f0e663f81203b00aa7a50 - Patch | |
| References | () https://git.kernel.org/stable/c/1284733bab736e598341f1d3f3b94e2a322864a8 - Patch | |
| References | () https://git.kernel.org/stable/c/1dcc144c322a8d526b791135604c0663f1af9d85 - Patch | |
| References | () https://git.kernel.org/stable/c/2286770b07cb5268c03d11274b8efd43dff0d380 - Patch | |
| References | () https://git.kernel.org/stable/c/2f35b7673a3aa3d09b3eb05811669622ebaa98ca - Patch | |
| References | () https://git.kernel.org/stable/c/32ee79682315e6d3c99947b3f38b078a09a66919 - Patch | |
| References | () https://git.kernel.org/stable/c/7abc8318ce0712182bf0783dcfdd9a6a8331160e - Patch | |
| References | () https://git.kernel.org/stable/c/864ca690ff135078d374bd565b9872f161c614bc - Patch | |
| References | () https://git.kernel.org/stable/c/ce8fe975fd99b49c29c42e50f2441ba53112b2e8 - Patch | |
| References | () https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html - Third Party Advisory | |
| References | () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html - Third Party Advisory | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
|
| CWE | CWE-617 |
03 Nov 2025, 20:18
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Information
Published : 2025-04-18 07:15
Updated : 2025-11-06 21:35
NVD link : CVE-2025-38637
Mitre link : CVE-2025-38637
CVE.ORG link : CVE-2025-38637
JSON object : View
Products Affected
linux
- linux_kernel
debian
- debian_linux
CWE
CWE-617
Reachable Assertion
