CVE-2025-37890Use After Free in Linux

Severity
7.8HIGHNVD
OSV8.8OSV5.9OSV4.7
EPSS
0.1%
top 76.01%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 16
Latest updateFeb 27

Description

In the Linux kernel, the following vulnerability has been resolved: net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc As described in Gerrard's report [1], we have a UAF case when an hfsc class has a netem child qdisc. The crux of the issue is that hfsc is assuming that checking for cl->qdisc->q.qlen == 0 guarantees that it hasn't inserted the class in the vttree or eltree (which is not true for the netem duplicate case). This patch checks the n_active class variable

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages15 packages

Also affects: Debian Linux 11.0

Patches

🔴Vulnerability Details

32
OSV
linux-azure-5.15 vulnerabilities2025-09-02
OSV
linux-azure-fips vulnerabilities2025-08-22
OSV
linux-raspi vulnerabilities2025-08-05
OSV
linux-iot vulnerabilities2025-08-04
OSV
linux-azure vulnerabilities2025-07-30

📋Vendor Advisories

32
Chrome
Long Term Support Channel Update for ChromeOS: CVE-2025-378902026-02-27
Ubuntu
Linux kernel (Azure) vulnerabilities2025-09-02
Ubuntu
Linux kernel (Azure FIPS) vulnerabilities2025-08-22
Ubuntu
Linux kernel (Raspberry Pi) vulnerabilities2025-08-05
Ubuntu
Linux kernel (IoT) vulnerabilities2025-08-04
CVE-2025-37890 — Use After Free in Linux | cvebase