Skip to main content

CVE-2025-37913: Vulnerability in Linux Linux

High
VulnerabilityCVE-2025-37913cvecve-2025-37913
Published: Tue May 20 2025 (05/20/2025, 15:21:44 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: net_sched: qfq: Fix double list add in class with netem as child qdisc As described in Gerrard's report [1], there are use cases where a netem child qdisc will make the parent qdisc's enqueue callback reentrant. In the case of qfq, there won't be a UAF, but the code will add the same classifier to the list twice, which will cause memory corruption. This patch checks whether the class was already added to the agg->active list (cl_is_active) before doing the addition to cater for the reentrant case. [1] https://lore.kernel.org/netdev/CAHcdcOm+03OD2j6R0=YHKqmy=VgJ8xEOKuP6c7mSgnp-TEJJbw@mail.gmail.com/

AI-Powered Analysis

AILast updated: 07/04/2025, 01:27:17 UTC

Technical Analysis

CVE-2025-37913 is a vulnerability identified in the Linux kernel's network scheduling subsystem, specifically involving the 'qfq' (Quick Fair Queueing) queuing discipline when used with 'netem' (Network Emulator) as a child queuing discipline. The issue arises due to a reentrancy problem in the enqueue callback of the parent qdisc when netem is used as a child. In this scenario, the qfq code may add the same classifier to its active list twice, leading to memory corruption. Although this vulnerability does not result in a use-after-free (UAF) condition, the double addition of the classifier to the list can corrupt kernel memory structures, potentially causing system instability or crashes. The root cause is that the qfq code did not check if the class was already active in the aggregation list before adding it again. The patch introduced addresses this by verifying the class's active status (cl_is_active) before adding it, thus preventing the double list addition in reentrant cases. This vulnerability is present in certain Linux kernel versions identified by the commit hash 37d9cf1a3ce35de3df6f7d209bfb1f50cf188cea and was publicly disclosed on May 20, 2025. No known exploits are currently reported in the wild. The vulnerability affects the kernel's network scheduling functionality, which is critical for managing traffic shaping and quality of service on Linux systems.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to systems running affected Linux kernel versions with network scheduling configurations that utilize qfq with netem as a child qdisc. The memory corruption could lead to kernel crashes, resulting in denial of service (DoS) conditions. In environments where Linux servers manage critical network traffic shaping—such as ISPs, telecom providers, cloud service providers, and enterprises with complex network infrastructure—this could disrupt service availability. Although there is no direct evidence of privilege escalation or remote code execution, the instability caused by memory corruption could be exploited by attackers to cause outages or potentially facilitate further attacks if combined with other vulnerabilities. Given the widespread use of Linux in European data centers, cloud environments, and embedded systems, the impact could be significant if unpatched. Systems that rely on precise network traffic control, such as those in financial services, healthcare, and industrial control systems, may experience operational disruptions. However, exploitation requires specific network configurations and likely local or privileged access to trigger the vulnerable code path, limiting the attack surface somewhat.

Mitigation Recommendations

European organizations should prioritize updating their Linux kernels to versions that include the patch fixing CVE-2025-37913. Specifically, kernel versions incorporating the fix that checks the class's active status before adding it to the agg->active list should be deployed. Network administrators should audit their systems to identify usage of the qfq queuing discipline with netem as a child qdisc and consider temporarily disabling or reconfiguring these settings if immediate patching is not feasible. Additionally, organizations should implement strict access controls and monitoring on systems running affected kernels to detect abnormal kernel crashes or network behavior indicative of exploitation attempts. Employing kernel live patching solutions where available can reduce downtime during patch deployment. Regularly reviewing kernel logs and network scheduler configurations will help identify potential exploitation attempts. Finally, maintaining a robust incident response plan that includes Linux kernel vulnerabilities will aid in rapid containment and recovery.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2025-04-16T04:51:23.967Z
Cisa Enriched
false
Cvss Version
null
State
PUBLISHED

Threat ID: 682cd0f71484d88663aeaf71

Added to database: 5/20/2025, 6:59:03 PM

Last enriched: 7/4/2025, 1:27:17 AM

Last updated: 8/17/2025, 1:34:44 AM

Views: 18

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats