CVE-2025-38193
net_sched: sch_sfq: reject invalid perturb period
Description
In the Linux kernel, the following vulnerability has been resolved: net_sched: sch_sfq: reject invalid perturb period Gerrard Tai reported that SFQ perturb_period has no range check yet, and this can be used to trigger a race condition fixed in a separate patch. We want to make sure ctl->perturb_period * HZ will not overflow and is positive. tc qd add dev lo root sfq perturb -10 # negative value : error Error: sch_sfq: invalid perturb period. tc qd add dev lo root sfq perturb 1000000000 # too big : error Error: sch_sfq: invalid perturb period. tc qd add dev lo root sfq perturb 2000000 # acceptable value tc -s -d qd sh dev lo qdisc sfq 8005: root refcnt 2 limit 127p quantum 64Kb depth 127 flows 128 divisor 1024 perturb 2000000sec Sent 0 bytes 0 pkt (dropped 0, overlimits 0 requeues 0) backlog 0b 0p requeues 0
INFO
Published Date :
July 4, 2025, 2:15 p.m.
Last Modified :
Dec. 18, 2025, 9:25 p.m.
Remotely Exploit :
No
Source :
416baaa9-dc9f-4396-8d5f-8c081fb06d67
CVSS Scores
| Score | Version | Severity | Vector | Exploitability Score | Impact Score | Source |
|---|---|---|---|---|---|---|
| CVSS 3.1 | MEDIUM | [email protected] |
Solution
- Update the Linux kernel to the latest version.
- Apply relevant security patches for net_sched.
- Ensure SFQ perturb period has range checks.
- Test system stability after updates.
References to Advisories, Solutions, and Tools
Here, you will find a curated list of external links that provide in-depth
information, practical solutions, and valuable tools related to
CVE-2025-38193.
CWE - Common Weakness Enumeration
While CVE identifies
specific instances of vulnerabilities, CWE categorizes the common flaws or
weaknesses that can lead to vulnerabilities. CVE-2025-38193 is
associated with the following CWEs:
Common Attack Pattern Enumeration and Classification (CAPEC)
Common Attack Pattern Enumeration and Classification
(CAPEC)
stores attack patterns, which are descriptions of the common attributes and
approaches employed by adversaries to exploit the CVE-2025-38193
weaknesses.
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2025-38193 vulnerability anywhere in the article.
The following table lists the changes that have been made to the
CVE-2025-38193 vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
Initial Analysis by [email protected]
Dec. 18, 2025
Action Type Old Value New Value Added CVSS V3.1 AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Added CWE CWE-190 Added CPE Configuration OR *cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:2.6.12:rc2:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:2.6.12:rc3:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:2.6.12:-:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.11 up to (excluding) 5.15.186 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.16 up to (excluding) 6.1.142 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.2 up to (excluding) 6.6.95 *cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:* *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.13 up to (excluding) 6.15.4 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 6.7 up to (excluding) 6.12.35 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 5.5 up to (excluding) 5.10.240 *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 2.6.13 up to (excluding) 5.4.297 Added CPE Configuration OR *cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* Added Reference Type kernel.org: https://git.kernel.org/stable/c/0357da9149eac621f39e235a135ebf155f01f7c3 Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/2254d038dab9c194fe6a4b1ce31034f42e91a6e5 Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/590b2d7d0beadba2aa576708a05a05f0aae39295 Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/7ca52541c05c832d32b112274f81a985101f9ba8 Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/956b5aebb349449b38d920d444ca1392d43719d1 Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/b11a50544af691b787384089b68f740ae20a441b Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/e0936ff56be4e08ad5b60ec26971eae0c40af305 Types: Patch Added Reference Type kernel.org: https://git.kernel.org/stable/c/f9b97d466e6026ccbdda30bb5b71965b67ccbc82 Types: Patch Added Reference Type CVE: https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html Types: Third Party Advisory Added Reference Type CVE: https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html Types: Third Party Advisory -
CVE Modified by af854a3a-2127-422b-91ae-364da2661108
Nov. 03, 2025
Action Type Old Value New Value Added Reference https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html Added Reference https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html -
CVE Modified by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Aug. 28, 2025
Action Type Old Value New Value Added Reference https://git.kernel.org/stable/c/e0936ff56be4e08ad5b60ec26971eae0c40af305 -
CVE Modified by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Jul. 17, 2025
Action Type Old Value New Value Added Reference https://git.kernel.org/stable/c/2254d038dab9c194fe6a4b1ce31034f42e91a6e5 -
New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Jul. 04, 2025
Action Type Old Value New Value Added Description In the Linux kernel, the following vulnerability has been resolved: net_sched: sch_sfq: reject invalid perturb period Gerrard Tai reported that SFQ perturb_period has no range check yet, and this can be used to trigger a race condition fixed in a separate patch. We want to make sure ctl->perturb_period * HZ will not overflow and is positive. tc qd add dev lo root sfq perturb -10 # negative value : error Error: sch_sfq: invalid perturb period. tc qd add dev lo root sfq perturb 1000000000 # too big : error Error: sch_sfq: invalid perturb period. tc qd add dev lo root sfq perturb 2000000 # acceptable value tc -s -d qd sh dev lo qdisc sfq 8005: root refcnt 2 limit 127p quantum 64Kb depth 127 flows 128 divisor 1024 perturb 2000000sec Sent 0 bytes 0 pkt (dropped 0, overlimits 0 requeues 0) backlog 0b 0p requeues 0 Added Reference https://git.kernel.org/stable/c/0357da9149eac621f39e235a135ebf155f01f7c3 Added Reference https://git.kernel.org/stable/c/590b2d7d0beadba2aa576708a05a05f0aae39295 Added Reference https://git.kernel.org/stable/c/7ca52541c05c832d32b112274f81a985101f9ba8 Added Reference https://git.kernel.org/stable/c/956b5aebb349449b38d920d444ca1392d43719d1 Added Reference https://git.kernel.org/stable/c/b11a50544af691b787384089b68f740ae20a441b Added Reference https://git.kernel.org/stable/c/f9b97d466e6026ccbdda30bb5b71965b67ccbc82