SB2025090489 - NULL pointer dereference in Linux kernel sched
Published: September 4, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) NULL pointer dereference (CVE-ID: CVE-2025-38684)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to NULL pointer dereference within the ets_qdisc_change() function in net/sched/sch_ets.c. A local user can perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/5b3b346bc4c2aa2c428735438a11989d251f32f1
- https://git.kernel.org/stable/c/84a24fb446ee07b22b64aae6f0e3f4a38266310a
- https://git.kernel.org/stable/c/87c6efc5ce9c126ae4a781bc04504b83780e3650
- https://git.kernel.org/stable/c/970c1c731c4ede46d05f5b0355724d1e400cfbca
- https://git.kernel.org/stable/c/97ec167cd2e8a81a2d87331a2ed92daf007542c8
- https://git.kernel.org/stable/c/bdfddcde86e8b9245d9c0c2efe2b6fe8dcf6bf41
- https://git.kernel.org/stable/c/be9692dafdfb36d9c43afd9d4e1d9d9ba8e7b51b
- https://git.kernel.org/stable/c/d69f4a258cd91b3bcef7089eb0401005aae2aed5