CVE-2025-37823

In the Linux kernel, the following vulnerability has been resolved: net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too Similarly to the previous patch, we need to safe guard hfsc_dequeue() too. But for this one, we don't have a reliable reproducer.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc3:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

10 Nov 2025, 15:52

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.8
CWE CWE-416
First Time Debian debian Linux
Linux
Debian
Linux linux Kernel
References () https://git.kernel.org/stable/c/11bccb054c1462fb069219f8e98e97a5a730758e - () https://git.kernel.org/stable/c/11bccb054c1462fb069219f8e98e97a5a730758e - Patch
References () https://git.kernel.org/stable/c/2f46d14919c39528c6e540ebc43f90055993eedc - () https://git.kernel.org/stable/c/2f46d14919c39528c6e540ebc43f90055993eedc - Patch
References () https://git.kernel.org/stable/c/68f256305ceb426d545a0dc31f83c2ab1d211a1e - () https://git.kernel.org/stable/c/68f256305ceb426d545a0dc31f83c2ab1d211a1e - Patch
References () https://git.kernel.org/stable/c/6ccbda44e2cc3d26fd22af54c650d6d5d801addf - () https://git.kernel.org/stable/c/6ccbda44e2cc3d26fd22af54c650d6d5d801addf - Patch
References () https://git.kernel.org/stable/c/76c4c22c2437d3d3880efc0f62eca06ef078d290 - () https://git.kernel.org/stable/c/76c4c22c2437d3d3880efc0f62eca06ef078d290 - Patch
References () https://git.kernel.org/stable/c/c6936266f8bf98a53f28ef9a820e6a501e946d09 - () https://git.kernel.org/stable/c/c6936266f8bf98a53f28ef9a820e6a501e946d09 - Patch
References () https://git.kernel.org/stable/c/c6f035044104c6ff656f4565cd22938dc892528c - () https://git.kernel.org/stable/c/c6f035044104c6ff656f4565cd22938dc892528c - Patch
References () https://git.kernel.org/stable/c/da7936518996d290e2fcfcaf6cd7e15bfd87804a - () https://git.kernel.org/stable/c/da7936518996d290e2fcfcaf6cd7e15bfd87804a - Patch
References () https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html - () https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html - Mailing List, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html - () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html - Mailing List, Third Party Advisory
CPE cpe:2.3:o:linux:linux_kernel:6.15:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc2:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.15:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*

03 Nov 2025, 20:18

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html -
  • () https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html -

08 May 2025, 14:39

Type Values Removed Values Added
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net_sched: hfsc: Se corrige también un posible UAF en hfsc_dequeue(). Al igual que en el parche anterior, también debemos proteger hfsc_dequeue(). Sin embargo, para este caso, no contamos con un reproductor fiable.

08 May 2025, 07:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-08 07:15

Updated : 2025-11-10 15:52


NVD link : CVE-2025-37823

Mitre link : CVE-2025-37823

CVE.ORG link : CVE-2025-37823


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel
CWE
CWE-416

Use After Free