7.8 CVE-2025-37798

Patch
 

In the Linux kernel, the following vulnerability has been resolved: codel: remove sch->q.qlen check before qdisc_tree_reduce_backlog() After making all ->qlen_notify() callbacks idempotent, now it is safe to remove the check of qlen!=0 from both fq_codel_dequeue() and codel_qdisc_dequeue().
https://nvd.nist.gov/vuln/detail/CVE-2025-37798

Categories

CWE-NVD-noinfo

References


 

CPE

cpe start end
Configuration 1
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* >= 3.5 < 5.4.297
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* >= 5.5 < 5.10.241
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* >= 5.11 < 5.15.190
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* >= 5.16 < 6.1.135
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* >= 6.2 < 6.6.88
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* >= 6.7 < 6.12.24
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* >= 6.13 < 6.13.12
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* >= 6.14 < 6.14.3
cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:*
Configuration 2
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*


REMEDIATION


Patch

Url
https://git.kernel.org/stable/c/2f9761a94bae33d26e6a81b31b36e7d776d93dc1
https://git.kernel.org/stable/c/342debc12183b51773b3345ba267e9263bdfaaef
https://git.kernel.org/stable/c/4d55144b12e742404bb3f8fee6038bafbf45619d
https://git.kernel.org/stable/c/7a742a9506849d1c1aa71e36c89855ceddc7d58e
https://git.kernel.org/stable/c/829c49b6b2ff45b043739168fd1245e4e1a91a30
https://git.kernel.org/stable/c/a57fe60ef4cf96bfbb6b58397ec28bdb5a5c6b31
https://git.kernel.org/stable/c/cc71a757da78dd4aa1b4a9b19cb011833730ccf2
https://git.kernel.org/stable/c/e73c838c80dccb9e4f19becc11d9f3cb4a27d483
https://git.kernel.org/stable/c/eda741fe155ddf5ecd2dd3bfbd4fc3c0c7dbb450


EXPLOITS


Exploit-db.com

id description date
No known exploits

POC Github

Url
No known exploits

Other Nist (github, ...)

Url
No known exploits


CAPEC


Common Attack Pattern Enumerations and Classifications

id description severity
No entry