CVE-2025-37913

Source
https://cve.org/CVERecord?id=CVE-2025-37913
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-37913.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-37913
Downstream
Related
Published
2025-05-20T15:21:44.793Z
Modified
2026-03-11T07:52:02.848911Z
Summary
net_sched: qfq: Fix double list add in class with netem as child qdisc
Details

In the Linux kernel, the following vulnerability has been resolved:

net_sched: qfq: Fix double list add in class with netem as child qdisc

As described in Gerrard's report [1], there are use cases where a netem child qdisc will make the parent qdisc's enqueue callback reentrant. In the case of qfq, there won't be a UAF, but the code will add the same classifier to the list twice, which will cause memory corruption.

This patch checks whether the class was already added to the agg->active list (clisactive) before doing the addition to cater for the reentrant case.

[1] https://lore.kernel.org/netdev/CAHcdcOm+03OD2j6R0=YHKqmy=VgJ8xEOKuP6c7mSgnp-TEJJbw@mail.gmail.com/

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/37xxx/CVE-2025-37913.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
37d9cf1a3ce35de3df6f7d209bfb1f50cf188cea
Fixed
041f410aec2c1751ee22b8b73ba05d38c3a6a602
Fixed
005a479540478a820c52de098e5e767e63e36f0a
Fixed
0bf32d6fb1fcbf841bb9945570e0e2a70072c00f
Fixed
0aa23e0856b7cedb3c88d8e3d281c212c7e4fbeb
Fixed
a43783119e01849fbf2fe8855634e8989b240cb4
Fixed
53bc0b55178bd59bdd4bcd16349505cabf54b1a2
Fixed
370218e8ce711684acc4cdd3cc3c6dd7956bc165
Fixed
f139f37dcdf34b67f5bf92bc8e0f7f6b3ac63aa4

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-37913.json"