CVE-2025-37913: Vulnerability in Linux Linux
In the Linux kernel, the following vulnerability has been resolved: net_sched: qfq: Fix double list add in class with netem as child qdisc As described in Gerrard's report [1], there are use cases where a netem child qdisc will make the parent qdisc's enqueue callback reentrant. In the case of qfq, there won't be a UAF, but the code will add the same classifier to the list twice, which will cause memory corruption. This patch checks whether the class was already added to the agg->active list (cl_is_active) before doing the addition to cater for the reentrant case. [1] https://lore.kernel.org/netdev/CAHcdcOm+03OD2j6R0=YHKqmy=VgJ8xEOKuP6c7mSgnp-TEJJbw@mail.gmail.com/
AI Analysis
Technical Summary
CVE-2025-37913 is a vulnerability identified in the Linux kernel's network scheduling subsystem, specifically involving the 'qfq' (Quick Fair Queueing) queuing discipline when used with 'netem' (Network Emulator) as a child queuing discipline. The issue arises due to a reentrancy problem in the enqueue callback of the parent qdisc when netem is used as a child. In this scenario, the qfq code may add the same classifier to its active list twice, leading to memory corruption. Although this vulnerability does not result in a use-after-free (UAF) condition, the double addition of the classifier to the list can corrupt kernel memory structures, potentially causing system instability or crashes. The root cause is that the qfq code did not check if the class was already active in the aggregation list before adding it again. The patch introduced addresses this by verifying the class's active status (cl_is_active) before adding it, thus preventing the double list addition in reentrant cases. This vulnerability is present in certain Linux kernel versions identified by the commit hash 37d9cf1a3ce35de3df6f7d209bfb1f50cf188cea and was publicly disclosed on May 20, 2025. No known exploits are currently reported in the wild. The vulnerability affects the kernel's network scheduling functionality, which is critical for managing traffic shaping and quality of service on Linux systems.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running affected Linux kernel versions with network scheduling configurations that utilize qfq with netem as a child qdisc. The memory corruption could lead to kernel crashes, resulting in denial of service (DoS) conditions. In environments where Linux servers manage critical network traffic shaping—such as ISPs, telecom providers, cloud service providers, and enterprises with complex network infrastructure—this could disrupt service availability. Although there is no direct evidence of privilege escalation or remote code execution, the instability caused by memory corruption could be exploited by attackers to cause outages or potentially facilitate further attacks if combined with other vulnerabilities. Given the widespread use of Linux in European data centers, cloud environments, and embedded systems, the impact could be significant if unpatched. Systems that rely on precise network traffic control, such as those in financial services, healthcare, and industrial control systems, may experience operational disruptions. However, exploitation requires specific network configurations and likely local or privileged access to trigger the vulnerable code path, limiting the attack surface somewhat.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernels to versions that include the patch fixing CVE-2025-37913. Specifically, kernel versions incorporating the fix that checks the class's active status before adding it to the agg->active list should be deployed. Network administrators should audit their systems to identify usage of the qfq queuing discipline with netem as a child qdisc and consider temporarily disabling or reconfiguring these settings if immediate patching is not feasible. Additionally, organizations should implement strict access controls and monitoring on systems running affected kernels to detect abnormal kernel crashes or network behavior indicative of exploitation attempts. Employing kernel live patching solutions where available can reduce downtime during patch deployment. Regularly reviewing kernel logs and network scheduler configurations will help identify potential exploitation attempts. Finally, maintaining a robust incident response plan that includes Linux kernel vulnerabilities will aid in rapid containment and recovery.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2025-37913: Vulnerability in Linux Linux
Description
In the Linux kernel, the following vulnerability has been resolved: net_sched: qfq: Fix double list add in class with netem as child qdisc As described in Gerrard's report [1], there are use cases where a netem child qdisc will make the parent qdisc's enqueue callback reentrant. In the case of qfq, there won't be a UAF, but the code will add the same classifier to the list twice, which will cause memory corruption. This patch checks whether the class was already added to the agg->active list (cl_is_active) before doing the addition to cater for the reentrant case. [1] https://lore.kernel.org/netdev/CAHcdcOm+03OD2j6R0=YHKqmy=VgJ8xEOKuP6c7mSgnp-TEJJbw@mail.gmail.com/
AI-Powered Analysis
Technical Analysis
CVE-2025-37913 is a vulnerability identified in the Linux kernel's network scheduling subsystem, specifically involving the 'qfq' (Quick Fair Queueing) queuing discipline when used with 'netem' (Network Emulator) as a child queuing discipline. The issue arises due to a reentrancy problem in the enqueue callback of the parent qdisc when netem is used as a child. In this scenario, the qfq code may add the same classifier to its active list twice, leading to memory corruption. Although this vulnerability does not result in a use-after-free (UAF) condition, the double addition of the classifier to the list can corrupt kernel memory structures, potentially causing system instability or crashes. The root cause is that the qfq code did not check if the class was already active in the aggregation list before adding it again. The patch introduced addresses this by verifying the class's active status (cl_is_active) before adding it, thus preventing the double list addition in reentrant cases. This vulnerability is present in certain Linux kernel versions identified by the commit hash 37d9cf1a3ce35de3df6f7d209bfb1f50cf188cea and was publicly disclosed on May 20, 2025. No known exploits are currently reported in the wild. The vulnerability affects the kernel's network scheduling functionality, which is critical for managing traffic shaping and quality of service on Linux systems.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to systems running affected Linux kernel versions with network scheduling configurations that utilize qfq with netem as a child qdisc. The memory corruption could lead to kernel crashes, resulting in denial of service (DoS) conditions. In environments where Linux servers manage critical network traffic shaping—such as ISPs, telecom providers, cloud service providers, and enterprises with complex network infrastructure—this could disrupt service availability. Although there is no direct evidence of privilege escalation or remote code execution, the instability caused by memory corruption could be exploited by attackers to cause outages or potentially facilitate further attacks if combined with other vulnerabilities. Given the widespread use of Linux in European data centers, cloud environments, and embedded systems, the impact could be significant if unpatched. Systems that rely on precise network traffic control, such as those in financial services, healthcare, and industrial control systems, may experience operational disruptions. However, exploitation requires specific network configurations and likely local or privileged access to trigger the vulnerable code path, limiting the attack surface somewhat.
Mitigation Recommendations
European organizations should prioritize updating their Linux kernels to versions that include the patch fixing CVE-2025-37913. Specifically, kernel versions incorporating the fix that checks the class's active status before adding it to the agg->active list should be deployed. Network administrators should audit their systems to identify usage of the qfq queuing discipline with netem as a child qdisc and consider temporarily disabling or reconfiguring these settings if immediate patching is not feasible. Additionally, organizations should implement strict access controls and monitoring on systems running affected kernels to detect abnormal kernel crashes or network behavior indicative of exploitation attempts. Employing kernel live patching solutions where available can reduce downtime during patch deployment. Regularly reviewing kernel logs and network scheduler configurations will help identify potential exploitation attempts. Finally, maintaining a robust incident response plan that includes Linux kernel vulnerabilities will aid in rapid containment and recovery.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Linux
- Date Reserved
- 2025-04-16T04:51:23.967Z
- Cisa Enriched
- false
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 682cd0f71484d88663aeaf71
Added to database: 5/20/2025, 6:59:03 PM
Last enriched: 7/4/2025, 1:27:17 AM
Last updated: 8/17/2025, 1:34:44 AM
Views: 18
Related Threats
CVE-2025-47206: CWE-787 in QNAP Systems Inc. File Station 5
HighCVE-2025-5296: CWE-59 Improper Link Resolution Before File Access ('Link Following') in Schneider Electric SESU
HighCVE-2025-6625: CWE-20 Improper Input Validation in Schneider Electric Modicon M340
HighCVE-2025-57703: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Delta Electronics DIAEnergie
MediumCVE-2025-57702: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Delta Electronics DIAEnergie
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.