CVE-2025-37992
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
26/05/2025
Last modified:
16/12/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
net_sched: Flush gso_skb list too during ->change()<br />
<br />
Previously, when reducing a qdisc&#39;s limit via the ->change() operation, only<br />
the main skb queue was trimmed, potentially leaving packets in the gso_skb<br />
list. This could result in NULL pointer dereference when we only check<br />
sch->limit against sch->q.qlen.<br />
<br />
This patch introduces a new helper, qdisc_dequeue_internal(), which ensures<br />
both the gso_skb list and the main queue are properly flushed when trimming<br />
excess packets. All relevant qdiscs (codel, fq, fq_codel, fq_pie, hhf, pie)<br />
are updated to use this helper in their ->change() routines.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 3.5 (including) | 5.10.238 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.184 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.140 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.92 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.30 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.14.8 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.15:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.15:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.15:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.15:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.15:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/2d3cbfd6d54a2c39ce3244f33f85c595844bd7b8
- https://git.kernel.org/stable/c/a7d6e0ac0a8861f6b1027488062251a8e28150fd
- https://git.kernel.org/stable/c/d1365ca80b012d8a7863e45949e413fb61fa4861
- https://git.kernel.org/stable/c/d3336f746f196c6a53e0480923ae93939f047b6c
- https://git.kernel.org/stable/c/d38939ebe0d992d581acb6885c1723fa83c1fb2c
- https://git.kernel.org/stable/c/ea1132ccb112f51ba749c56a912f67970c2cd542
- https://git.kernel.org/stable/c/fe88c7e4fc2c1cd75a278a15ffbf1689efad4e76
- https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html
- https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html



