CVE-2025-38637

In the Linux kernel, the following vulnerability has been resolved: net_sched: skbprio: Remove overly strict queue assertions In the current implementation, skbprio enqueue/dequeue contains an assertion that fails under certain conditions when SKBPRIO is used as a child qdisc under TBF with specific parameters. The failure occurs because TBF sometimes peeks at packets in the child qdisc without actually dequeuing them when tokens are unavailable. This peek operation creates a discrepancy between the parent and child qdisc queue length counters. When TBF later receives a high-priority packet, SKBPRIO's queue length may show a different value than what's reflected in its internal priority queue tracking, triggering the assertion. The fix removes this overly strict assertions in SKBPRIO, they are not necessary at all.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

06 Nov 2025, 21:35

Type Values Removed Values Added
First Time Linux linux Kernel
Debian
Debian debian Linux
Linux
References () https://git.kernel.org/stable/c/034b293bf17c124fec0f0e663f81203b00aa7a50 - () https://git.kernel.org/stable/c/034b293bf17c124fec0f0e663f81203b00aa7a50 - Patch
References () https://git.kernel.org/stable/c/1284733bab736e598341f1d3f3b94e2a322864a8 - () https://git.kernel.org/stable/c/1284733bab736e598341f1d3f3b94e2a322864a8 - Patch
References () https://git.kernel.org/stable/c/1dcc144c322a8d526b791135604c0663f1af9d85 - () https://git.kernel.org/stable/c/1dcc144c322a8d526b791135604c0663f1af9d85 - Patch
References () https://git.kernel.org/stable/c/2286770b07cb5268c03d11274b8efd43dff0d380 - () https://git.kernel.org/stable/c/2286770b07cb5268c03d11274b8efd43dff0d380 - Patch
References () https://git.kernel.org/stable/c/2f35b7673a3aa3d09b3eb05811669622ebaa98ca - () https://git.kernel.org/stable/c/2f35b7673a3aa3d09b3eb05811669622ebaa98ca - Patch
References () https://git.kernel.org/stable/c/32ee79682315e6d3c99947b3f38b078a09a66919 - () https://git.kernel.org/stable/c/32ee79682315e6d3c99947b3f38b078a09a66919 - Patch
References () https://git.kernel.org/stable/c/7abc8318ce0712182bf0783dcfdd9a6a8331160e - () https://git.kernel.org/stable/c/7abc8318ce0712182bf0783dcfdd9a6a8331160e - Patch
References () https://git.kernel.org/stable/c/864ca690ff135078d374bd565b9872f161c614bc - () https://git.kernel.org/stable/c/864ca690ff135078d374bd565b9872f161c614bc - Patch
References () https://git.kernel.org/stable/c/ce8fe975fd99b49c29c42e50f2441ba53112b2e8 - () https://git.kernel.org/stable/c/ce8fe975fd99b49c29c42e50f2441ba53112b2e8 - Patch
References () https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html - () https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html - Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html - () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html - Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
CWE CWE-617

03 Nov 2025, 20:18

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html -
  • () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html -

Information

Published : 2025-04-18 07:15

Updated : 2025-11-06 21:35


NVD link : CVE-2025-38637

Mitre link : CVE-2025-38637

CVE.ORG link : CVE-2025-38637


JSON object : View

Products Affected

linux

  • linux_kernel

debian

  • debian_linux
CWE
CWE-617

Reachable Assertion