CVE-2025-37752

7.8 HIGH

📋 TL;DR

This CVE-2025-37752 is a Linux kernel vulnerability in the Stochastic Fairness Queueing (SFQ) network scheduler that allows array index out-of-bounds access due to improper limit validation. Attackers with local access can trigger a kernel crash (denial of service) or potentially execute arbitrary code. All Linux systems using the affected kernel versions with SFQ scheduler enabled are vulnerable.

💻 Affected Systems

Products:
  • Linux kernel
Versions: Specific versions not explicitly stated in CVE, but references indicate fixes in stable kernel trees. Likely affects multiple recent versions before fixes.
Operating Systems: Linux distributions using vulnerable kernel versions
Default Config Vulnerable: ✅ No
Notes: Only vulnerable if SFQ scheduler is configured and used. Default configurations may not use SFQ.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local privilege escalation to kernel-level code execution leading to full system compromise.

🟠

Likely Case

Kernel panic or system crash causing denial of service.

🟢

If Mitigated

No impact if SFQ scheduler is not used or system is patched.

🌐 Internet-Facing: LOW - Requires local access to trigger.
🏢 Internal Only: MEDIUM - Local attackers or malicious users can exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access and ability to configure network scheduler parameters via tc command.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Kernel versions with commits 1348214fa042a71406964097e743c87a42c85a49 and related fixes

Vendor Advisory: https://git.kernel.org/stable/c/1348214fa042a71406964097e743c87a42c85a49

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version. 2. Check distribution-specific security advisories. 3. Reboot system after kernel update.

🔧 Temporary Workarounds

Disable SFQ scheduler

linux

Remove or disable SFQ scheduler configurations to prevent exploitation

tc qdisc del dev [interface] root sfq
Remove SFQ configurations from network scripts

🧯 If You Can't Patch

  • Restrict access to tc command and network configuration tools
  • Implement strict access controls to prevent local users from modifying network scheduler parameters

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if SFQ scheduler is configured: tc qdisc show | grep sfq

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is updated beyond vulnerable versions and test SFQ configuration with limit parameter

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic logs
  • UBSAN array-index-out-of-bounds errors
  • System crash/reboot events

Network Indicators:

  • Unusual tc command usage patterns
  • Multiple SFQ configuration attempts

SIEM Query:

Search for 'UBSAN: array-index-out-of-bounds' or 'sch_sfq.c' in kernel logs

🔗 References

📤 Share & Export