- Description
- In the Linux kernel, the following vulnerability has been resolved: net_sched: hfsc: Fix a UAF vulnerability in class handling This patch fixes a Use-After-Free vulnerability in the HFSC qdisc class handling. The issue occurs due to a time-of-check/time-of-use condition in hfsc_change_class() when working with certain child qdiscs like netem or codel. The vulnerability works as follows: 1. hfsc_change_class() checks if a class has packets (q.qlen != 0) 2. It then calls qdisc_peek_len(), which for certain qdiscs (e.g., codel, netem) might drop packets and empty the queue 3. The code continues assuming the queue is still non-empty, adding the class to vttree 4. This breaks HFSC scheduler assumptions that only non-empty classes are in vttree 5. Later, when the class is destroyed, this can lead to a Use-After-Free The fix adds a second queue length check after qdisc_peek_len() to verify the queue wasn't emptied.
- Source
- 416baaa9-dc9f-4396-8d5f-8c081fb06d67
- NVD status
- Analyzed
- Products
- linux_kernel, debian_linux
CVSS 3.1
- Type
- Primary
- Base score
- 7.8
- Impact score
- 5.9
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
- nvd@nist.gov
- CWE-416
- Hype score
- Not currently trending
🚨 CRITICAL: #Ubuntu 16.04 LTS #OracleCloud kernel patches released (USN-7685-5). Multiple high-severity CVEs (inc. CVE-2025-37797, CVE-2024-56748) - risk system compromise. Read more: 👉https://t.co/37IQUckFib #Security https://t.co/6rtZp8YFok
@Cezar_H_Linux
13 Aug 2025
46 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🔒 URGENT: #openSUSE kernel patches for 3 critical CVEs (CVE-2025-37797, CVE-2025-37752, CVE-2025-21702) are live! DoS risks threaten unpatched systems—especially networks using HFSC/SFQ scheduling. 👉 https://t.co/JkPnR7DScY https://t.co/dKVwjDqDG6
@Cezar_H_Linux
5 Aug 2025
38 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Critical #LinuxKernel Patches! SUSE Live Patch 38 (SLE 15 SP4 / openSUSE Leap 15.4) fixes 4 HIGH-sev vulns: ✅ CVE-2025-37797 (HFSC UAF). ✅ CVE-2024-53125 (BPF flaw). ✅ CVE-2025-21702 (pfifo). ✅ CVE-2025-37752 (SFQ). Read more:👉 https://t.co/9xiz3h2QSu https://t.c
@Cezar_H_Linux
4 Aug 2025
46 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CVE-2025-37797 (7.8 CVSS) in Linux HFSC scheduler allows UAF attacks! SUSE Live Patch 34 out NOW for SLE 15 SP4/Leap 15.4. ⏩ Patch: zypper in -t patch SUSE-2025-2610=1 Read more: 👉 https://t.co/wHC2XZDFPy https://t.co/lp47ForYWL
@Cezar_H_Linux
4 Aug 2025
37 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
🚨 Breaking: #SUSE Live Patch 51 for SLE 15 SP3 patches 4 high-risk kernel vulns (CVE-2024-56664, CVE-2025-37797). ✅ Affects openSUSE Leap 15.3, SAP systems. ✅ Exploits: UAF, packet drops, privilege escalation. Read more: 👉https://t.co/jNyyYnCnf7 https://t.co/nwEhA5LdV
@Cezar_H_Linux
4 Aug 2025
50 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Breaking: #Ubuntu 24.04/22.04 LTS kernel vulnerabilities (CVE-2025-38083, CVE-2025-37797) allow RCE via network subsystem. ⏱️ Low-latency environments at HIGH risk! Read more: 👉 https://t.co/eHy3mURBuh https://t.co/ahk9WPkIdp
@Cezar_H_Linux
1 Aug 2025
32 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8D3ABA83-8B6C-43AD-9878-0CA649728149",
"versionEndExcluding": "5.4.293",
"versionStartIncluding": "4.14.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0710B81E-E2FA-4E15-8F68-D297EBB4D50D",
"versionEndExcluding": "5.10.237",
"versionStartIncluding": "5.5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "12331C9E-F601-4EFC-899E-369F98DCC70B",
"versionEndExcluding": "5.15.181",
"versionStartIncluding": "5.11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "27735C1B-DDFC-4860-8952-1D01025F9D4C",
"versionEndExcluding": "6.1.136",
"versionStartIncluding": "5.16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D79CE030-3114-45E0-B52B-C77781BCB587",
"versionEndExcluding": "6.6.89",
"versionStartIncluding": "6.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "22F52099-F422-4D19-8283-45F9F9BF4392",
"versionEndExcluding": "6.12.26",
"versionStartIncluding": "6.7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6B25CA7E-4CD0-46DB-B4EF-13A3516071FB",
"versionEndExcluding": "6.14.5",
"versionStartIncluding": "6.13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:4.14:-:*:*:*:*:*:*",
"matchCriteriaId": "7875AA30-1F6F-470C-A52D-ECBD6663CEC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:4.14:rc2:*:*:*:*:*:*",
"matchCriteriaId": "B483DA9A-D449-48DE-9CA2-CEA23FD0B202",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:4.14:rc3:*:*:*:*:*:*",
"matchCriteriaId": "DEF29F06-4FF7-4FE6-B66D-9D758B182CF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:4.14:rc4:*:*:*:*:*:*",
"matchCriteriaId": "17941A19-6A3D-477F-BC6A-972D7F815FDD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:4.14:rc5:*:*:*:*:*:*",
"matchCriteriaId": "4C9B8FA6-754F-42F5-98BC-410AF7DB9F4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:4.14:rc6:*:*:*:*:*:*",
"matchCriteriaId": "EC8F8565-B401-4F3C-B423-51F371DCB908",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:4.14:rc7:*:*:*:*:*:*",
"matchCriteriaId": "C834B5F2-810F-4291-8E1F-1B32635E08F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:4.14:rc8:*:*:*:*:*:*",
"matchCriteriaId": "BB4A96BC-72CC-4EF1-916C-9ED7177C196E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:*",
"matchCriteriaId": "8D465631-2980-487A-8E65-40AE2B9F8ED1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.15:rc2:*:*:*:*:*:*",
"matchCriteriaId": "4C9D071F-B28E-46EC-AC61-22B913390211",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:6.15:rc3:*:*:*:*:*:*",
"matchCriteriaId": "13FC0DDE-E513-465E-9E81-515702D49B74",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]