CVE-2025-37752
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
01/05/2025
Last modified:
04/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
net_sched: sch_sfq: move the limit validation<br />
<br />
It is not sufficient to directly validate the limit on the data that<br />
the user passes as it can be updated based on how the other parameters<br />
are changed.<br />
<br />
Move the check at the end of the configuration update process to also<br />
catch scenarios where the limit is indirectly updated, for example<br />
with the following configurations:<br />
<br />
tc qdisc add dev dummy0 handle 1: root sfq limit 2 flows 1 depth 1<br />
tc qdisc add dev dummy0 handle 1: root sfq limit 2 flows 1 divisor 1<br />
<br />
This fixes the following syzkaller reported crash:<br />
<br />
------------[ cut here ]------------<br />
UBSAN: array-index-out-of-bounds in net/sched/sch_sfq.c:203:6<br />
index 65535 is out of range for type &#39;struct sfq_head[128]&#39;<br />
CPU: 1 UID: 0 PID: 3037 Comm: syz.2.16 Not tainted 6.14.0-rc2-syzkaller #0<br />
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024<br />
Call Trace:<br />
<br />
__dump_stack lib/dump_stack.c:94 [inline]<br />
dump_stack_lvl+0x201/0x300 lib/dump_stack.c:120<br />
ubsan_epilogue lib/ubsan.c:231 [inline]<br />
__ubsan_handle_out_of_bounds+0xf5/0x120 lib/ubsan.c:429<br />
sfq_link net/sched/sch_sfq.c:203 [inline]<br />
sfq_dec+0x53c/0x610 net/sched/sch_sfq.c:231<br />
sfq_dequeue+0x34e/0x8c0 net/sched/sch_sfq.c:493<br />
sfq_reset+0x17/0x60 net/sched/sch_sfq.c:518<br />
qdisc_reset+0x12e/0x600 net/sched/sch_generic.c:1035<br />
tbf_reset+0x41/0x110 net/sched/sch_tbf.c:339<br />
qdisc_reset+0x12e/0x600 net/sched/sch_generic.c:1035<br />
dev_reset_queue+0x100/0x1b0 net/sched/sch_generic.c:1311<br />
netdev_for_each_tx_queue include/linux/netdevice.h:2590 [inline]<br />
dev_deactivate_many+0x7e5/0xe70 net/sched/sch_generic.c:1375
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.1.129 (including) | 6.1.135 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.6.76 (including) | 6.6.88 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.12.13 (including) | 6.12.24 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13.2 (including) | 6.13.12 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.14 (including) | 6.14.3 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/1348214fa042a71406964097e743c87a42c85a49
- https://git.kernel.org/stable/c/5e5e1fcc1b8ed57f902c424c5d9b328a3a19073d
- https://git.kernel.org/stable/c/6c589aa318023690f1606c666a7fb5f4c1c9c219
- https://git.kernel.org/stable/c/7d62ded97db6b7c94c891f704151f372b1ba4688
- https://git.kernel.org/stable/c/8fadc871a42933aacb7f1ce9ed9a96485e2c9cf4
- https://git.kernel.org/stable/c/b36a68192037d1614317a09b0d78c7814e2eecf9
- https://git.kernel.org/stable/c/b3bf8f63e6179076b57c9de660c9f80b5abefe70
- https://git.kernel.org/stable/c/d2718324f9e329b10ddc091fba5a0ba2b9d4d96a
- https://git.kernel.org/stable/c/f86293adce0c201cfabb283ef9d6f21292089bb8
- https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html



