CVE-2025-37752: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: net_sched: sch_sfq: move the limit validation It is not sufficient to directly validate the limit on the data that the user passes as it can be updated based on how the other parameters are changed. Move the check at the end of the configuration update process to also catch scenarios where the limit is indirectly updated, for example with the following configurations: tc qdisc add dev dummy0 handle 1: root sfq limit 2 flows 1 depth 1 tc qdisc add dev dummy0 handle 1: root sfq limit 2 flows 1 divisor 1 This fixes the following syzkaller reported crash: ------------[ cut here ]------------ UBSAN: array-index-out-of-bounds in net/sched/sch_sfq.c:203:6 index 65535 is out of range for type 'struct sfq_head[128]' CPU: 1 UID: 0 PID: 3037 Comm: syz.2.16 Not tainted 6.14.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 Call Trace: <TASK> __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x201/0x300 lib/dump_stack.c:120 ubsan_epilogue lib/ubsan.c:231 [inline] __ubsan_handle_out_of_bounds+0xf5/0x120 lib/ubsan.c:429 sfq_link net/sched/sch_sfq.c:203 [inline] sfq_dec+0x53c/0x610 net/sched/sch_sfq.c:231 sfq_dequeue+0x34e/0x8c0 net/sched/sch_sfq.c:493 sfq_reset+0x17/0x60 net/sched/sch_sfq.c:518 qdisc_reset+0x12e/0x600 net/sched/sch_generic.c:1035 tbf_reset+0x41/0x110 net/sched/sch_tbf.c:339 qdisc_reset+0x12e/0x600 net/sched/sch_generic.c:1035 dev_reset_queue+0x100/0x1b0 net/sched/sch_generic.c:1311 netdev_for_each_tx_queue include/linux/netdevice.h:2590 [inline] dev_deactivate_many+0x7e5/0xe70 net/sched/sch_generic.c:1375
AI Analysis
Technical Summary
CVE-2025-37752 is a vulnerability identified in the Linux kernel's network scheduler component, specifically within the 'sch_sfq' (Stochastic Fairness Queueing) queuing discipline implementation. The issue arises from insufficient validation of the 'limit' parameter during configuration updates. Initially, the limit was validated only on direct user input; however, it could be indirectly modified through changes to other parameters such as 'flows' and 'divisor'. This flaw allowed scenarios where the limit value could become inconsistent or out-of-bounds, leading to an array index out-of-bounds error in the 'sfq_head' array. The vulnerability was discovered through syzkaller fuzz testing, which triggered a crash due to an out-of-bounds access at net/sched/sch_sfq.c line 203. The root cause is that the validation check was performed too early in the configuration update process, missing indirect updates to the limit. The fix involved moving the limit validation to the end of the configuration update process to ensure all parameter interactions are accounted for before applying the limit. This prevents invalid configurations that could cause kernel crashes or undefined behavior. The vulnerability affects multiple Linux kernel versions as indicated by the affected commit hashes. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations relying on Linux-based systems, especially those using advanced network traffic control features like SFQ for managing network queues, this vulnerability poses a risk of local denial of service (DoS) through kernel crashes. Attackers with the ability to configure network queuing disciplines (typically requiring root or elevated privileges) could exploit this flaw to cause system instability or crashes, potentially disrupting network services or impacting availability. While remote exploitation is unlikely without prior access, compromised insiders or attackers with administrative access could leverage this bug to escalate disruption. Critical infrastructure providers, cloud service operators, and enterprises with Linux-based networking equipment or servers could see service interruptions. Additionally, embedded Linux devices used in industrial control systems or telecommunications within Europe might be affected if they use vulnerable kernel versions. The vulnerability does not appear to allow privilege escalation or remote code execution directly but could be used as part of a multi-stage attack to degrade system reliability or availability.
Mitigation Recommendations
1. Apply the official Linux kernel patches that move the limit validation to the end of the configuration update process as soon as they become available. Monitor Linux kernel mailing lists and vendor advisories for updates. 2. Restrict access to network configuration utilities such as 'tc' (traffic control) to trusted administrators only, minimizing the risk of unauthorized exploitation. 3. Implement strict access controls and auditing on systems that allow network queue configuration changes to detect and prevent suspicious activities. 4. For environments using automated configuration management, validate configurations to avoid setting parameters that could indirectly cause invalid limit values. 5. In critical environments, consider temporarily disabling or avoiding the use of the SFQ queuing discipline until patched, or switch to alternative queuing disciplines not affected by this vulnerability. 6. Conduct thorough testing of network configurations after patching to ensure stability and correct behavior. 7. Maintain up-to-date backups and incident response plans to quickly recover from potential DoS incidents caused by exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain, Poland, Belgium
CVE-2025-37752: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: net_sched: sch_sfq: move the limit validation It is not sufficient to directly validate the limit on the data that the user passes as it can be updated based on how the other parameters are changed. Move the check at the end of the configuration update process to also catch scenarios where the limit is indirectly updated, for example with the following configurations: tc qdisc add dev dummy0 handle 1: root sfq limit 2 flows 1 depth 1 tc qdisc add dev dummy0 handle 1: root sfq limit 2 flows 1 divisor 1 This fixes the following syzkaller reported crash: ------------[ cut here ]------------ UBSAN: array-index-out-of-bounds in net/sched/sch_sfq.c:203:6 index 65535 is out of range for type 'struct sfq_head[128]' CPU: 1 UID: 0 PID: 3037 Comm: syz.2.16 Not tainted 6.14.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 Call Trace: <TASK> __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x201/0x300 lib/dump_stack.c:120 ubsan_epilogue lib/ubsan.c:231 [inline] __ubsan_handle_out_of_bounds+0xf5/0x120 lib/ubsan.c:429 sfq_link net/sched/sch_sfq.c:203 [inline] sfq_dec+0x53c/0x610 net/sched/sch_sfq.c:231 sfq_dequeue+0x34e/0x8c0 net/sched/sch_sfq.c:493 sfq_reset+0x17/0x60 net/sched/sch_sfq.c:518 qdisc_reset+0x12e/0x600 net/sched/sch_generic.c:1035 tbf_reset+0x41/0x110 net/sched/sch_tbf.c:339 qdisc_reset+0x12e/0x600 net/sched/sch_generic.c:1035 dev_reset_queue+0x100/0x1b0 net/sched/sch_generic.c:1311 netdev_for_each_tx_queue include/linux/netdevice.h:2590 [inline] dev_deactivate_many+0x7e5/0xe70 net/sched/sch_generic.c:1375
AI-Powered Analysis
Technical Analysis
CVE-2025-37752 is a vulnerability identified in the Linux kernel's network scheduler component, specifically within the 'sch_sfq' (Stochastic Fairness Queueing) queuing discipline implementation. The issue arises from insufficient validation of the 'limit' parameter during configuration updates. Initially, the limit was validated only on direct user input; however, it could be indirectly modified through changes to other parameters such as 'flows' and 'divisor'. This flaw allowed scenarios where the limit value could become inconsistent or out-of-bounds, leading to an array index out-of-bounds error in the 'sfq_head' array. The vulnerability was discovered through syzkaller fuzz testing, which triggered a crash due to an out-of-bounds access at net/sched/sch_sfq.c line 203. The root cause is that the validation check was performed too early in the configuration update process, missing indirect updates to the limit. The fix involved moving the limit validation to the end of the configuration update process to ensure all parameter interactions are accounted for before applying the limit. This prevents invalid configurations that could cause kernel crashes or undefined behavior. The vulnerability affects multiple Linux kernel versions as indicated by the affected commit hashes. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet.
Potential Impact
For European organizations relying on Linux-based systems, especially those using advanced network traffic control features like SFQ for managing network queues, this vulnerability poses a risk of local denial of service (DoS) through kernel crashes. Attackers with the ability to configure network queuing disciplines (typically requiring root or elevated privileges) could exploit this flaw to cause system instability or crashes, potentially disrupting network services or impacting availability. While remote exploitation is unlikely without prior access, compromised insiders or attackers with administrative access could leverage this bug to escalate disruption. Critical infrastructure providers, cloud service operators, and enterprises with Linux-based networking equipment or servers could see service interruptions. Additionally, embedded Linux devices used in industrial control systems or telecommunications within Europe might be affected if they use vulnerable kernel versions. The vulnerability does not appear to allow privilege escalation or remote code execution directly but could be used as part of a multi-stage attack to degrade system reliability or availability.
Mitigation Recommendations
1. Apply the official Linux kernel patches that move the limit validation to the end of the configuration update process as soon as they become available. Monitor Linux kernel mailing lists and vendor advisories for updates. 2. Restrict access to network configuration utilities such as 'tc' (traffic control) to trusted administrators only, minimizing the risk of unauthorized exploitation. 3. Implement strict access controls and auditing on systems that allow network queue configuration changes to detect and prevent suspicious activities. 4. For environments using automated configuration management, validate configurations to avoid setting parameters that could indirectly cause invalid limit values. 5. In critical environments, consider temporarily disabling or avoiding the use of the SFQ queuing discipline until patched, or switch to alternative queuing disciplines not affected by this vulnerability. 6. Conduct thorough testing of network configurations after patching to ensure stability and correct behavior. 7. Maintain up-to-date backups and incident response plans to quickly recover from potential DoS incidents caused by exploitation attempts.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-04-16T04:51:23.937Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682d9832c4522896dcbe8305
Added to database: 5/21/2025, 9:09:06 AM
Last enriched: 7/3/2025, 10:40:41 PM
Last updated: 8/18/2025, 11:28:46 PM
Views: 23
Related Threats
CVE-2025-8567: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in posimyththemes Nexter Blocks – WordPress Gutenberg Blocks & 1000+ Starter Templates
MediumCVE-2025-41689: CWE-306 Missing Authentication for Critical Function in Wiesemann & Theis Motherbox 3
MediumCVE-2025-41685: CWE-359 Exposure of Private Personal Information to an Unauthorized Actor in SMA ennexos.sunnyportal.com
MediumCVE-2025-8723: CWE-94 Improper Control of Generation of Code ('Code Injection') in mecanik Cloudflare Image Resizing – Optimize & Accelerate Your Images
CriticalCVE-2025-8622: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in webaware Flexible Map
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.