net/sched: sch_qfq: Fix race condition on qfq_aggregate
A race condition can occur when 'agg' is modified in qfq_change_agg
(called during qfq_enqueue) while other threads access it
concurrently. For example, qfq_dump_class may trigger a NULL
dereference, and qfq_delete_class may cause a use-after-free.
This patch addresses the issue by:
1. Moved qfq_destroy_class into the critical section.
2. Added sch_tree_lock protection to qfq_dump_class and
qfq_dump_class_stats.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-4327-1 | linux security update |
Debian DLA |
DLA-4328-1 | linux-6.1 security update |
Debian DSA |
DSA-5973-1 | linux security update |
Debian DSA |
DSA-5975-1 | linux security update |
EUVD |
EUVD-2025-22885 | In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_qfq: Fix race condition on qfq_aggregate A race condition can occur when 'agg' is modified in qfq_change_agg (called during qfq_enqueue) while other threads access it concurrently. For example, qfq_dump_class may trigger a NULL dereference, and qfq_delete_class may cause a use-after-free. This patch addresses the issue by: 1. Moved qfq_destroy_class into the critical section. 2. Added sch_tree_lock protection to qfq_dump_class and qfq_dump_class_stats. |
Ubuntu USN |
USN-7791-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7792-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7793-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7795-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7796-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7791-2 | Linux kernel (Real-time) vulnerabilities |
Ubuntu USN |
USN-7798-1 | Linux kernel (Azure) vulnerabilities |
Ubuntu USN |
USN-7792-2 | Linux kernel (Raspberry Pi) vulnerabilities |
Ubuntu USN |
USN-7799-1 | Linux kernel (Real-time) vulnerabilities |
Ubuntu USN |
USN-7800-1 | Linux kernel (Raspberry Pi Real-time) vulnerabilities |
Ubuntu USN |
USN-7793-2 | Linux kernel (Oracle) vulnerabilities |
Ubuntu USN |
USN-7793-3 | Linux kernel (FIPS) vulnerabilities |
Ubuntu USN |
USN-7793-4 | Linux kernel (Real-time) vulnerabilities |
Ubuntu USN |
USN-7801-1 | Linux kernel (HWE) vulnerabilities |
Ubuntu USN |
USN-7795-2 | Linux kernel (FIPS) vulnerabilities |
Ubuntu USN |
USN-7796-2 | Linux kernel (FIPS) vulnerabilities |
Ubuntu USN |
USN-7796-3 | Linux kernel (Azure) vulnerabilities |
Ubuntu USN |
USN-7791-3 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7801-2 | Linux kernel (Oracle) vulnerabilities |
Ubuntu USN |
USN-7792-3 | Linux kernel (AWS) vulnerabilities |
Ubuntu USN |
USN-7808-1 | Linux kernel (Azure) vulnerabilities |
Ubuntu USN |
USN-7809-1 | Linux kernel (Azure, N-Series) vulnerabilities |
Ubuntu USN |
USN-7793-5 | Linux kernel (GKE) vulnerabilities |
Ubuntu USN |
USN-7810-1 | Linux kernel (Azure) vulnerabilities |
Ubuntu USN |
USN-7811-1 | Linux kernel (NVIDIA Tegra IGX) vulnerabilities |
Ubuntu USN |
USN-7795-3 | Linux kernel (AWS FIPS) vulnerabilities |
Ubuntu USN |
USN-7819-1 | Linux kernel (Azure) vulnerabilities |
Ubuntu USN |
USN-7796-4 | Linux kernel (Azure FIPS) kernel vulnerabilities |
Ubuntu USN |
USN-7820-1 | Linux kernel (Oracle) vulnerabilities |
Ubuntu USN |
USN-7791-4 | Linux kernel (Oracle) vulnerabilities |
Ubuntu USN |
USN-7821-1 | Linux kernel (Raspberry Pi) vulnerabilities |
Ubuntu USN |
USN-7808-2 | Linux kernel (Azure) vulnerabilities |
Ubuntu USN |
USN-7810-2 | Linux kernel (Azure) vulnerabilities |
Ubuntu USN |
USN-7810-3 | Linux kernel (Azure FIPS) vulnerabilities |
Ubuntu USN |
USN-7801-3 | Linux kernel (Oracle) vulnerabilities |
Ubuntu USN |
USN-7819-2 | Linux kernel (Azure FIPS) vulnerabilities |
Ubuntu USN |
USN-7795-4 | Linux kernel (Oracle) vulnerabilities |
Ubuntu USN |
USN-7854-1 | Linux kernel (KVM) vulnerabilities |
Ubuntu USN |
USN-7795-5 | Linux kernel (Raspberry Pi) vulnerabilities |
Ubuntu USN |
USN-7875-1 | Linux kernel (Oracle) vulnerabilities |
Ubuntu USN |
USN-7933-1 | Linux kernel (KVM) vulnerabilities |
Tue, 12 May 2026 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 23 Dec 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Debian
Debian debian Linux |
|
| Weaknesses | CWE-362 | |
| CPEs | cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.16:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.16:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.16:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.16:rc6:*:*:*:*:*:* |
|
| Vendors & Products |
Debian
Debian debian Linux |
|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Mon, 03 Nov 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 28 Aug 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 29 Jul 2025 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Tue, 29 Jul 2025 08:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Linux
Linux linux Kernel |
|
| Vendors & Products |
Linux
Linux linux Kernel |
Mon, 28 Jul 2025 11:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_qfq: Fix race condition on qfq_aggregate A race condition can occur when 'agg' is modified in qfq_change_agg (called during qfq_enqueue) while other threads access it concurrently. For example, qfq_dump_class may trigger a NULL dereference, and qfq_delete_class may cause a use-after-free. This patch addresses the issue by: 1. Moved qfq_destroy_class into the critical section. 2. Added sch_tree_lock protection to qfq_dump_class and qfq_dump_class_stats. | |
| Title | net/sched: sch_qfq: Fix race condition on qfq_aggregate | |
| References |
|
|
Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2026-05-12T12:05:08.048Z
Reserved: 2025-04-16T04:51:24.021Z
Link: CVE-2025-38477
No data.
Status : Modified
Published: 2025-07-28T12:15:29.617
Modified: 2026-05-12T13:16:51.007
Link: CVE-2025-38477
OpenCVE Enrichment
Updated: 2025-07-29T07:59:22Z
Debian DLA
Debian DSA
EUVD
Ubuntu USN