CVE-2025-38553
📋 TL;DR
A Linux kernel vulnerability in the netem network emulation qdisc allows a denial-of-service condition when duplicating netems exist in the same qdisc tree. This can cause soft lockups and OOM loops in netem_dequeue, potentially crashing affected systems. Systems using Linux kernel with netem qdisc configured are affected.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
System becomes unresponsive due to soft lockup and OOM loop, requiring reboot to recover
Likely Case
Network performance degradation or service disruption on affected interfaces
If Mitigated
Minimal impact if netem is not used or properly configured
🎯 Exploit Status
Requires ability to configure network qdiscs, typically root/admin access
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Patches available in stable kernel branches (commits provided in references)
Vendor Advisory: https://git.kernel.org/stable/c/09317dfb681ac5a96fc69bea0c54441cf91b8270
Restart Required: Yes
Instructions:
1. Update Linux kernel to patched version 2. Reboot system 3. Verify patch applied with version check
🔧 Temporary Workarounds
Disable netem duplication
allRemove or disable netem qdisc configurations that use packet duplication
tc qdisc del dev <interface> root netem duplicate <percentage>
tc qdisc show
Avoid multiple netems in same tree
allEnsure only one netem qdisc exists in any qdisc tree hierarchy
tc qdisc show
Review and simplify qdisc configurations
🧯 If You Can't Patch
- Monitor system logs for soft lockup or OOM warnings related to netem
- Implement network segmentation to limit exposure of affected systems
🔍 How to Verify
Check if Vulnerable:
Check if netem qdisc is configured with duplication: tc qdisc show | grep -i netem
Check Version:
uname -r
Verify Fix Applied:
Check kernel version includes patched commits or verify netem configurations are safe
📡 Detection & Monitoring
Log Indicators:
- Kernel soft lockup messages
- OOM killer activity
- netem-related kernel warnings
Network Indicators:
- Unusual packet duplication rates
- Network interface performance degradation
SIEM Query:
kernel: "soft lockup" OR "netem" OR "qdisc" AND ("duplicate" OR "OOM")
🔗 References
- https://git.kernel.org/stable/c/09317dfb681ac5a96fc69bea0c54441cf91b8270
- https://git.kernel.org/stable/c/103c4e27ec9f5fe53022e46e976abf52c7221baf
- https://git.kernel.org/stable/c/250f8796006c0f2bc638ce545f601d49ae8d528b
- https://git.kernel.org/stable/c/325f5ec67cc0a77f2d0d453445b9857f1cd06c76
- https://git.kernel.org/stable/c/795cb393e38977aa991e70a9363da0ee734b2114
- https://git.kernel.org/stable/c/ad340a4b4adb855b18b3666f26ad65c8968e2deb
- https://git.kernel.org/stable/c/cab2809944989889f88a1a8b5cff1c78460c72cb
- https://git.kernel.org/stable/c/ec8e0e3d7adef940cdf9475e2352c0680189d14e
- https://git.kernel.org/stable/c/f088b6ebe8797a3f948d2cae47f34bfb45cc6522
- https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html