Bug 2360926 (CVE-2025-38637) - CVE-2025-38637 kernel: net_sched: skbprio: Remove overly strict queue assertions
Summary: CVE-2025-38637 kernel: net_sched: skbprio: Remove overly strict queue assertions
Keywords:
Status: NEW
Alias: CVE-2025-38637
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-04-18 08:01 UTC by OSIDB Bzimport
Modified: 2025-04-18 13:37 UTC (History)
4 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-04-18 08:01:33 UTC
In the Linux kernel, the following vulnerability has been resolved:

net_sched: skbprio: Remove overly strict queue assertions

In the current implementation, skbprio enqueue/dequeue contains an assertion
that fails under certain conditions when SKBPRIO is used as a child qdisc under
TBF with specific parameters. The failure occurs because TBF sometimes peeks at
packets in the child qdisc without actually dequeuing them when tokens are
unavailable.

This peek operation creates a discrepancy between the parent and child qdisc
queue length counters. When TBF later receives a high-priority packet,
SKBPRIO's queue length may show a different value than what's reflected in its
internal priority queue tracking, triggering the assertion.

The fix removes this overly strict assertions in SKBPRIO, they are not
necessary at all.

Comment 1 Avinash Hanwate 2025-04-18 13:30:22 UTC
Upstream advisory:
https://lore.kernel.org/linux-cve-announce/2025041819-CVE-2025-38637-8e27@gregkh/T


Note You need to log in before you can comment on or make changes to this bug.