๐Ÿ” CVE Alert

CVE-2025-37913

UNKNOWN 0.0

net_sched: qfq: Fix double list add in class with netem as child qdisc

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: net_sched: qfq: Fix double list add in class with netem as child qdisc As described in Gerrard's report [1], there are use cases where a netem child qdisc will make the parent qdisc's enqueue callback reentrant. In the case of qfq, there won't be a UAF, but the code will add the same classifier to the list twice, which will cause memory corruption. This patch checks whether the class was already added to the agg->active list (cl_is_active) before doing the addition to cater for the reentrant case. [1] https://lore.kernel.org/netdev/CAHcdcOm+03OD2j6R0=YHKqmy=VgJ8xEOKuP6c7mSgnp-TEJJbw@mail.gmail.com/

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published May 20, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
37d9cf1a3ce35de3df6f7d209bfb1f50cf188cea < 041f410aec2c1751ee22b8b73ba05d38c3a6a602 37d9cf1a3ce35de3df6f7d209bfb1f50cf188cea < 005a479540478a820c52de098e5e767e63e36f0a 37d9cf1a3ce35de3df6f7d209bfb1f50cf188cea < 0bf32d6fb1fcbf841bb9945570e0e2a70072c00f 37d9cf1a3ce35de3df6f7d209bfb1f50cf188cea < 0aa23e0856b7cedb3c88d8e3d281c212c7e4fbeb 37d9cf1a3ce35de3df6f7d209bfb1f50cf188cea < a43783119e01849fbf2fe8855634e8989b240cb4 37d9cf1a3ce35de3df6f7d209bfb1f50cf188cea < 53bc0b55178bd59bdd4bcd16349505cabf54b1a2 37d9cf1a3ce35de3df6f7d209bfb1f50cf188cea < 370218e8ce711684acc4cdd3cc3c6dd7956bc165 37d9cf1a3ce35de3df6f7d209bfb1f50cf188cea < f139f37dcdf34b67f5bf92bc8e0f7f6b3ac63aa4
Linux / Linux
5.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/041f410aec2c1751ee22b8b73ba05d38c3a6a602 git.kernel.org: https://git.kernel.org/stable/c/005a479540478a820c52de098e5e767e63e36f0a git.kernel.org: https://git.kernel.org/stable/c/0bf32d6fb1fcbf841bb9945570e0e2a70072c00f git.kernel.org: https://git.kernel.org/stable/c/0aa23e0856b7cedb3c88d8e3d281c212c7e4fbeb git.kernel.org: https://git.kernel.org/stable/c/a43783119e01849fbf2fe8855634e8989b240cb4 git.kernel.org: https://git.kernel.org/stable/c/53bc0b55178bd59bdd4bcd16349505cabf54b1a2 git.kernel.org: https://git.kernel.org/stable/c/370218e8ce711684acc4cdd3cc3c6dd7956bc165 git.kernel.org: https://git.kernel.org/stable/c/f139f37dcdf34b67f5bf92bc8e0f7f6b3ac63aa4 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html