๐Ÿ” CVE Alert

CVE-2025-37992

UNKNOWN 0.0

net_sched: Flush gso_skb list too during ->change()

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

In the Linux kernel, the following vulnerability has been resolved: net_sched: Flush gso_skb list too during ->change() Previously, when reducing a qdisc's limit via the ->change() operation, only the main skb queue was trimmed, potentially leaving packets in the gso_skb list. This could result in NULL pointer dereference when we only check sch->limit against sch->q.qlen. This patch introduces a new helper, qdisc_dequeue_internal(), which ensures both the gso_skb list and the main queue are properly flushed when trimming excess packets. All relevant qdiscs (codel, fq, fq_codel, fq_pie, hhf, pie) are updated to use this helper in their ->change() routines.

Vendor linux
Product linux
Ecosystems
Industries
Technology
Published May 26, 2025
Last Updated May 11, 2026
Stay Ahead of the Next One

Get instant alerts for linux linux

Be the first to know when new unknown vulnerabilities affecting linux linux are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Linux / Linux
76e3cc126bb223013a6b9a0e2a51238d1ef2e409 < ea1132ccb112f51ba749c56a912f67970c2cd542 76e3cc126bb223013a6b9a0e2a51238d1ef2e409 < d3336f746f196c6a53e0480923ae93939f047b6c 76e3cc126bb223013a6b9a0e2a51238d1ef2e409 < d38939ebe0d992d581acb6885c1723fa83c1fb2c 76e3cc126bb223013a6b9a0e2a51238d1ef2e409 < a7d6e0ac0a8861f6b1027488062251a8e28150fd 76e3cc126bb223013a6b9a0e2a51238d1ef2e409 < d1365ca80b012d8a7863e45949e413fb61fa4861 76e3cc126bb223013a6b9a0e2a51238d1ef2e409 < fe88c7e4fc2c1cd75a278a15ffbf1689efad4e76 76e3cc126bb223013a6b9a0e2a51238d1ef2e409 < 2d3cbfd6d54a2c39ce3244f33f85c595844bd7b8
Linux / Linux
3.5

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
git.kernel.org: https://git.kernel.org/stable/c/ea1132ccb112f51ba749c56a912f67970c2cd542 git.kernel.org: https://git.kernel.org/stable/c/d3336f746f196c6a53e0480923ae93939f047b6c git.kernel.org: https://git.kernel.org/stable/c/d38939ebe0d992d581acb6885c1723fa83c1fb2c git.kernel.org: https://git.kernel.org/stable/c/a7d6e0ac0a8861f6b1027488062251a8e28150fd git.kernel.org: https://git.kernel.org/stable/c/d1365ca80b012d8a7863e45949e413fb61fa4861 git.kernel.org: https://git.kernel.org/stable/c/fe88c7e4fc2c1cd75a278a15ffbf1689efad4e76 git.kernel.org: https://git.kernel.org/stable/c/2d3cbfd6d54a2c39ce3244f33f85c595844bd7b8 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html