CVE-2025-37798

In the Linux kernel, the following vulnerability has been resolved: codel: remove sch->q.qlen check before qdisc_tree_reduce_backlog() After making all ->qlen_notify() callbacks idempotent, now it is safe to remove the check of qlen!=0 from both fq_codel_dequeue() and codel_qdisc_dequeue().
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

06 Nov 2025, 20:49

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
References () https://git.kernel.org/stable/c/2f9761a94bae33d26e6a81b31b36e7d776d93dc1 - () https://git.kernel.org/stable/c/2f9761a94bae33d26e6a81b31b36e7d776d93dc1 - Patch
References () https://git.kernel.org/stable/c/342debc12183b51773b3345ba267e9263bdfaaef - () https://git.kernel.org/stable/c/342debc12183b51773b3345ba267e9263bdfaaef - Patch
References () https://git.kernel.org/stable/c/4d55144b12e742404bb3f8fee6038bafbf45619d - () https://git.kernel.org/stable/c/4d55144b12e742404bb3f8fee6038bafbf45619d - Patch
References () https://git.kernel.org/stable/c/7a742a9506849d1c1aa71e36c89855ceddc7d58e - () https://git.kernel.org/stable/c/7a742a9506849d1c1aa71e36c89855ceddc7d58e - Patch
References () https://git.kernel.org/stable/c/829c49b6b2ff45b043739168fd1245e4e1a91a30 - () https://git.kernel.org/stable/c/829c49b6b2ff45b043739168fd1245e4e1a91a30 - Patch
References () https://git.kernel.org/stable/c/a57fe60ef4cf96bfbb6b58397ec28bdb5a5c6b31 - () https://git.kernel.org/stable/c/a57fe60ef4cf96bfbb6b58397ec28bdb5a5c6b31 - Patch
References () https://git.kernel.org/stable/c/cc71a757da78dd4aa1b4a9b19cb011833730ccf2 - () https://git.kernel.org/stable/c/cc71a757da78dd4aa1b4a9b19cb011833730ccf2 - Patch
References () https://git.kernel.org/stable/c/e73c838c80dccb9e4f19becc11d9f3cb4a27d483 - () https://git.kernel.org/stable/c/e73c838c80dccb9e4f19becc11d9f3cb4a27d483 - Patch
References () https://git.kernel.org/stable/c/eda741fe155ddf5ecd2dd3bfbd4fc3c0c7dbb450 - () https://git.kernel.org/stable/c/eda741fe155ddf5ecd2dd3bfbd4fc3c0c7dbb450 - Patch
References () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html - () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html - Issue Tracking, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Issue Tracking, Third Party Advisory
CPE cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE NVD-CWE-noinfo
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel

03 Nov 2025, 20:18

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html -

03 Nov 2025, 18:15

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html -

28 Aug 2025, 15:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/7a742a9506849d1c1aa71e36c89855ceddc7d58e -
  • () https://git.kernel.org/stable/c/cc71a757da78dd4aa1b4a9b19cb011833730ccf2 -
  • () https://git.kernel.org/stable/c/eda741fe155ddf5ecd2dd3bfbd4fc3c0c7dbb450 -

05 May 2025, 20:54

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: codel: eliminar la comprobación de sch->q.qlen antes de qdisc_tree_reduce_backlog() Después de hacer que todas las devoluciones de llamadas ->qlen_notify() sean idempotentes, ahora es seguro eliminar la comprobación de qlen!=0 de fq_codel_dequeue() y codel_qdisc_dequeue().

02 May 2025, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-02 15:15

Updated : 2025-11-06 20:49


NVD link : CVE-2025-37798

Mitre link : CVE-2025-37798

CVE.ORG link : CVE-2025-37798


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel