{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-38000","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-04-16T04:51:23.976Z","datePublished":"2025-06-06T13:03:35.405Z","dateUpdated":"2026-05-11T21:19:22.480Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T21:19:22.480Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nsch_hfsc: Fix qlen accounting bug when using peek in hfsc_enqueue()\n\nWhen enqueuing the first packet to an HFSC class, hfsc_enqueue() calls the\nchild qdisc's peek() operation before incrementing sch->q.qlen and\nsch->qstats.backlog. If the child qdisc uses qdisc_peek_dequeued(), this may\ntrigger an immediate dequeue and potential packet drop. In such cases,\nqdisc_tree_reduce_backlog() is called, but the HFSC qdisc's qlen and backlog\nhave not yet been updated, leading to inconsistent queue accounting. This\ncan leave an empty HFSC class in the active list, causing further\nconsequences like use-after-free.\n\nThis patch fixes the bug by moving the increment of sch->q.qlen and\nsch->qstats.backlog before the call to the child qdisc's peek() operation.\nThis ensures that queue length and backlog are always accurate when packet\ndrops or dequeues are triggered during the peek."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["net/sched/sch_hfsc.c"],"versions":[{"version":"12d0ad3be9c3854e52ec74bb83bb6f43612827c7","lessThan":"1034e3310752e8675e313f7271b348914008719a","status":"affected","versionType":"git"},{"version":"12d0ad3be9c3854e52ec74bb83bb6f43612827c7","lessThan":"f9f593e34d2fb67644372c8f7b033bdc622ad228","status":"affected","versionType":"git"},{"version":"12d0ad3be9c3854e52ec74bb83bb6f43612827c7","lessThan":"89c301e929a0db14ebd94b4d97764ce1d6981653","status":"affected","versionType":"git"},{"version":"12d0ad3be9c3854e52ec74bb83bb6f43612827c7","lessThan":"f1dde3eb17dc1b8bd07aed00004b1e05fc87a3d4","status":"affected","versionType":"git"},{"version":"12d0ad3be9c3854e52ec74bb83bb6f43612827c7","lessThan":"93c276942e75de0e5bc91576300d292e968f5a02","status":"affected","versionType":"git"},{"version":"12d0ad3be9c3854e52ec74bb83bb6f43612827c7","lessThan":"49b21795b8e5654a7df3d910a12e1060da4c04cf","status":"affected","versionType":"git"},{"version":"12d0ad3be9c3854e52ec74bb83bb6f43612827c7","lessThan":"3f3a22eebbc32b4fa8ce9c1d5f9db214b45b9335","status":"affected","versionType":"git"},{"version":"12d0ad3be9c3854e52ec74bb83bb6f43612827c7","lessThan":"3f981138109f63232a5fb7165938d4c945cc1b9d","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["net/sched/sch_hfsc.c"],"versions":[{"version":"4.8","status":"affected"},{"version":"0","lessThan":"4.8","status":"unaffected","versionType":"semver"},{"version":"5.4.294","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.238","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.185","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.141","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.6.93","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.12.31","lessThanOrEqual":"6.12.*","status":"unaffected","versionType":"semver"},{"version":"6.14.9","lessThanOrEqual":"6.14.*","status":"unaffected","versionType":"semver"},{"version":"6.15","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.8","versionEndExcluding":"5.4.294"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.8","versionEndExcluding":"5.10.238"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.8","versionEndExcluding":"5.15.185"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.8","versionEndExcluding":"6.1.141"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.8","versionEndExcluding":"6.6.93"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.8","versionEndExcluding":"6.12.31"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.8","versionEndExcluding":"6.14.9"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.8","versionEndExcluding":"6.15"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/1034e3310752e8675e313f7271b348914008719a"},{"url":"https://git.kernel.org/stable/c/f9f593e34d2fb67644372c8f7b033bdc622ad228"},{"url":"https://git.kernel.org/stable/c/89c301e929a0db14ebd94b4d97764ce1d6981653"},{"url":"https://git.kernel.org/stable/c/f1dde3eb17dc1b8bd07aed00004b1e05fc87a3d4"},{"url":"https://git.kernel.org/stable/c/93c276942e75de0e5bc91576300d292e968f5a02"},{"url":"https://git.kernel.org/stable/c/49b21795b8e5654a7df3d910a12e1060da4c04cf"},{"url":"https://git.kernel.org/stable/c/3f3a22eebbc32b4fa8ce9c1d5f9db214b45b9335"},{"url":"https://git.kernel.org/stable/c/3f981138109f63232a5fb7165938d4c945cc1b9d"}],"title":"sch_hfsc: Fix qlen accounting bug when using peek in hfsc_enqueue()","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"title":"CVE Program Container","references":[{"url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"},{"url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-03T17:32:58.709Z"}}]}}