In the Linux kernel, the following vulnerability has been resolved:
net_sched: Flush gso_skb list too during ->change()
Previously, when reducing a qdisc's limit via the ->change() operation, only
the main skb queue was trimmed, potentially leaving packets in the gso_skb
list. This could result in NULL pointer dereference when we only check
sch->limit against sch->q.qlen.
This patch introduces a new helper, qdisc_dequeue_internal(), which ensures
both the gso_skb list and the main queue are properly flushed when trimming
excess packets. All relevant qdiscs (codel, fq, fq_codel, fq_pie, hhf, pie)
are updated to use this helper in their ->change() routines.
Metrics
Affected Vendors & Products
References
History
Wed, 04 Jun 2025 13:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Tue, 27 May 2025 02:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Mon, 26 May 2025 15:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the Linux kernel, the following vulnerability has been resolved: net_sched: Flush gso_skb list too during ->change() Previously, when reducing a qdisc's limit via the ->change() operation, only the main skb queue was trimmed, potentially leaving packets in the gso_skb list. This could result in NULL pointer dereference when we only check sch->limit against sch->q.qlen. This patch introduces a new helper, qdisc_dequeue_internal(), which ensures both the gso_skb list and the main queue are properly flushed when trimming excess packets. All relevant qdiscs (codel, fq, fq_codel, fq_pie, hhf, pie) are updated to use this helper in their ->change() routines. | |
Title | net_sched: Flush gso_skb list too during ->change() | |
References |
|
|

Status: PUBLISHED
Assigner: Linux
Published:
Updated: 2025-06-04T12:57:41.538Z
Reserved: 2025-04-16T04:51:23.976Z
Link: CVE-2025-37992

No data.

Status : Awaiting Analysis
Published: 2025-05-26T15:15:19.770
Modified: 2025-06-04T13:15:28.170
Link: CVE-2025-37992
