CVE-2025-37890

In the Linux kernel, the following vulnerability has been resolved:

net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc

As described in Gerrard's report [1], we have a UAF case when an hfsc class
has a netem child qdisc. The crux of the issue is that hfsc is assuming
that checking for cl->qdisc->q.qlen == 0 guarantees that it hasn't inserted
the class in the vttree or eltree (which is not true for the netem
duplicate case).

This patch checks the n_active class variable to make sure that the code
won't insert the class in the vttree or eltree twice, catering for the
reentrant case.

[1] https://lore.kernel.org/netdev/CAHcdcOm+03OD2j6R0=YHKqmy=VgJ8xEOKuP6c7mSgnp-TEJJbw@mail.gmail.com/
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.8 HIGH
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
LinuxCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 3%
VendorProductVersion
linuxlinux_kernel
5.0.1 ≤
𝑥
< 5.4.294
linuxlinux_kernel
5.5 ≤
𝑥
< 5.10.238
linuxlinux_kernel
5.11 ≤
𝑥
< 5.15.182
linuxlinux_kernel
5.16 ≤
𝑥
< 6.1.138
linuxlinux_kernel
6.2 ≤
𝑥
< 6.6.90
linuxlinux_kernel
6.7 ≤
𝑥
< 6.12.28
linuxlinux_kernel
6.13 ≤
𝑥
< 6.14.6
linuxlinux_kernel
5.0
linuxlinux_kernel
5.0:rc3
linuxlinux_kernel
5.0:rc4
linuxlinux_kernel
5.0:rc5
linuxlinux_kernel
5.0:rc6
linuxlinux_kernel
5.0:rc7
linuxlinux_kernel
5.0:rc8
linuxlinux_kernel
6.15:rc1
linuxlinux_kernel
6.15:rc2
linuxlinux_kernel
6.15:rc3
linuxlinux_kernel
6.15:rc4
debiandebian_linux
11.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
linux
bullseye
vulnerable
bullseye (security)
5.10.244-1
fixed
bookworm
6.1.148-1
fixed
bookworm (security)
6.1.158-1
fixed
trixie
6.12.57-1
fixed
trixie (security)
6.12.48-1
fixed
forky
6.17.9-1
fixed
sid
6.17.10-1
fixed
linux-6.1
bullseye (security)
6.1.158-1~deb11u1
fixed