๐Ÿ” CVE Alert

CVE-2025-37797

UNKNOWN 0.0

net_sched: hfsc: Fix a UAF vulnerability in class handling

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: net_sched: hfsc: Fix a UAF vulnerability in class handling This patch fixes a Use-After-Free vulnerability in the HFSC qdisc class handling. The issue occurs due to a time-of-check/time-of-use condition in hfsc_change_class() when working with certain child qdiscs like netem or codel. The vulnerability works as follows: 1. hfsc_change_class() checks if a class has packets (q.qlen != 0) 2. It then calls qdisc_peek_len(), which for certain qdiscs (e.g., codel, netem) might drop packets and empty the queue 3. The code continues assuming the queue is still non-empty, adding the class to vttree 4. This breaks HFSC scheduler assumptions that only non-empty classes are in vttree 5. Later, when the class is destroyed, this can lead to a Use-After-Free The fix adds a second queue length check after qdisc_peek_len() to verify the queue wasn't emptied.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published May 2, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
21f4d5cc25ec0e6e8eb8420dd2c399e6d2fc7d14 < 28b09a067831f7317c3841812276022d6c940677 21f4d5cc25ec0e6e8eb8420dd2c399e6d2fc7d14 < 39b9095dd3b55d9b2743df038c32138efa34a9de 21f4d5cc25ec0e6e8eb8420dd2c399e6d2fc7d14 < fcc8ede663569c704fb00a702973bd6c00373283 21f4d5cc25ec0e6e8eb8420dd2c399e6d2fc7d14 < 20d584a33e480ae80d105f43e0e7b56784da41b9 21f4d5cc25ec0e6e8eb8420dd2c399e6d2fc7d14 < 3aa852e3605000d5c47035c3fc3a986d14ccfa9f 21f4d5cc25ec0e6e8eb8420dd2c399e6d2fc7d14 < 86cd4641c713455a4f1c8e54c370c598c2b1cee0 21f4d5cc25ec0e6e8eb8420dd2c399e6d2fc7d14 < bb583c88d23b72d8d16453d24856c99bd93dadf5 21f4d5cc25ec0e6e8eb8420dd2c399e6d2fc7d14 < 3df275ef0a6ae181e8428a6589ef5d5231e58b5c
Linux / Linux
4.14

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/28b09a067831f7317c3841812276022d6c940677 git.kernel.org: https://git.kernel.org/stable/c/39b9095dd3b55d9b2743df038c32138efa34a9de git.kernel.org: https://git.kernel.org/stable/c/fcc8ede663569c704fb00a702973bd6c00373283 git.kernel.org: https://git.kernel.org/stable/c/20d584a33e480ae80d105f43e0e7b56784da41b9 git.kernel.org: https://git.kernel.org/stable/c/3aa852e3605000d5c47035c3fc3a986d14ccfa9f git.kernel.org: https://git.kernel.org/stable/c/86cd4641c713455a4f1c8e54c370c598c2b1cee0 git.kernel.org: https://git.kernel.org/stable/c/bb583c88d23b72d8d16453d24856c99bd93dadf5 git.kernel.org: https://git.kernel.org/stable/c/3df275ef0a6ae181e8428a6589ef5d5231e58b5c lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html