In the Linux kernel, the following vulnerability has been resolved:
net/sched: sch_qfq: Fix race condition on qfq_aggregate
A race condition can occur when 'agg' is modified in qfq_change_agg
(called during qfq_enqueue) while other threads access it
concurrently. For example, qfq_dump_class may trigger a NULL
dereference, and qfq_delete_class may cause a use-after-free.
This patch addresses the issue by:
1. Moved qfq_destroy_class into the critical section.
2. Added sch_tree_lock protection to qfq_dump_class and
qfq_dump_class_stats.
net/sched: sch_qfq: Fix race condition on qfq_aggregate
A race condition can occur when 'agg' is modified in qfq_change_agg
(called during qfq_enqueue) while other threads access it
concurrently. For example, qfq_dump_class may trigger a NULL
dereference, and qfq_delete_class may cause a use-after-free.
This patch addresses the issue by:
1. Moved qfq_destroy_class into the critical section.
2. Added sch_tree_lock protection to qfq_dump_class and
qfq_dump_class_stats.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-4327-1 | linux security update |
Debian DLA |
DLA-4328-1 | linux-6.1 security update |
Debian DSA |
DSA-5973-1 | linux security update |
Debian DSA |
DSA-5975-1 | linux security update |
EUVD |
EUVD-2025-22885 | In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_qfq: Fix race condition on qfq_aggregate A race condition can occur when 'agg' is modified in qfq_change_agg (called during qfq_enqueue) while other threads access it concurrently. For example, qfq_dump_class may trigger a NULL dereference, and qfq_delete_class may cause a use-after-free. This patch addresses the issue by: 1. Moved qfq_destroy_class into the critical section. 2. Added sch_tree_lock protection to qfq_dump_class and qfq_dump_class_stats. |
Ubuntu USN |
USN-7791-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7792-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7793-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7795-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7796-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7791-2 | Linux kernel (Real-time) vulnerabilities |
Ubuntu USN |
USN-7798-1 | Linux kernel (Azure) vulnerabilities |
Ubuntu USN |
USN-7792-2 | Linux kernel (Raspberry Pi) vulnerabilities |
Ubuntu USN |
USN-7799-1 | Linux kernel (Real-time) vulnerabilities |
Ubuntu USN |
USN-7800-1 | Linux kernel (Raspberry Pi Real-time) vulnerabilities |
Ubuntu USN |
USN-7793-2 | Linux kernel (Oracle) vulnerabilities |
Ubuntu USN |
USN-7793-3 | Linux kernel (FIPS) vulnerabilities |
Ubuntu USN |
USN-7793-4 | Linux kernel (Real-time) vulnerabilities |
Ubuntu USN |
USN-7801-1 | Linux kernel (HWE) vulnerabilities |
Ubuntu USN |
USN-7795-2 | Linux kernel (FIPS) vulnerabilities |
Ubuntu USN |
USN-7796-2 | Linux kernel (FIPS) vulnerabilities |
Ubuntu USN |
USN-7796-3 | Linux kernel (Azure) vulnerabilities |
Ubuntu USN |
USN-7791-3 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-7801-2 | Linux kernel (Oracle) vulnerabilities |
Ubuntu USN |
USN-7792-3 | Linux kernel (AWS) vulnerabilities |
Ubuntu USN |
USN-7808-1 | Linux kernel (Azure) vulnerabilities |
Ubuntu USN |
USN-7809-1 | Linux kernel (Azure, N-Series) vulnerabilities |
Ubuntu USN |
USN-7793-5 | Linux kernel (GKE) vulnerabilities |
Ubuntu USN |
USN-7810-1 | Linux kernel (Azure) vulnerabilities |
Ubuntu USN |
USN-7811-1 | Linux kernel (NVIDIA Tegra IGX) vulnerabilities |
Ubuntu USN |
USN-7795-3 | Linux kernel (AWS FIPS) vulnerabilities |
Ubuntu USN |
USN-7819-1 | Linux kernel (Azure) vulnerabilities |
Ubuntu USN |
USN-7796-4 | Linux kernel (Azure FIPS) kernel vulnerabilities |
Ubuntu USN |
USN-7820-1 | Linux kernel (Oracle) vulnerabilities |
Ubuntu USN |
USN-7791-4 | Linux kernel (Oracle) vulnerabilities |
Ubuntu USN |
USN-7821-1 | Linux kernel (Raspberry Pi) vulnerabilities |
Ubuntu USN |
USN-7808-2 | Linux kernel (Azure) vulnerabilities |
Ubuntu USN |
USN-7810-2 | Linux kernel (Azure) vulnerabilities |
Ubuntu USN |
USN-7810-3 | Linux kernel (Azure FIPS) vulnerabilities |
Ubuntu USN |
USN-7801-3 | Linux kernel (Oracle) vulnerabilities |
Ubuntu USN |
USN-7819-2 | Linux kernel (Azure FIPS) vulnerabilities |
Ubuntu USN |
USN-7795-4 | Linux kernel (Oracle) vulnerabilities |
Ubuntu USN |
USN-7854-1 | Linux kernel (KVM) vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 03 Nov 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 28 Aug 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 29 Jul 2025 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Tue, 29 Jul 2025 08:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Linux
Linux linux Kernel |
|
| Vendors & Products |
Linux
Linux linux Kernel |
Mon, 28 Jul 2025 11:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_qfq: Fix race condition on qfq_aggregate A race condition can occur when 'agg' is modified in qfq_change_agg (called during qfq_enqueue) while other threads access it concurrently. For example, qfq_dump_class may trigger a NULL dereference, and qfq_delete_class may cause a use-after-free. This patch addresses the issue by: 1. Moved qfq_destroy_class into the critical section. 2. Added sch_tree_lock protection to qfq_dump_class and qfq_dump_class_stats. | |
| Title | net/sched: sch_qfq: Fix race condition on qfq_aggregate | |
| References |
|
|
Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2025-11-03T17:38:44.755Z
Reserved: 2025-04-16T04:51:24.021Z
Link: CVE-2025-38477
No data.
Status : Awaiting Analysis
Published: 2025-07-28T12:15:29.617
Modified: 2025-11-03T18:16:23.767
Link: CVE-2025-38477
OpenCVE Enrichment
Updated: 2025-07-29T07:59:22Z
Debian DLA
Debian DSA
EUVD
Ubuntu USN