CVE-2025-37752
📋 TL;DR
This CVE-2025-37752 is a Linux kernel vulnerability in the Stochastic Fairness Queueing (SFQ) network scheduler that allows array index out-of-bounds access due to improper limit validation. Attackers with local access can trigger a kernel crash (denial of service) or potentially execute arbitrary code. All Linux systems using the affected kernel versions with SFQ scheduler enabled are vulnerable.
💻 Affected Systems
- Linux kernel
📦 What is this software?
Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →Linux Kernel by Linux
The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...
Learn more about Linux Kernel →⚠️ Risk & Real-World Impact
Worst Case
Local privilege escalation to kernel-level code execution leading to full system compromise.
Likely Case
Kernel panic or system crash causing denial of service.
If Mitigated
No impact if SFQ scheduler is not used or system is patched.
🎯 Exploit Status
Exploitation requires local access and ability to configure network scheduler parameters via tc command.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Kernel versions with commits 1348214fa042a71406964097e743c87a42c85a49 and related fixes
Vendor Advisory: https://git.kernel.org/stable/c/1348214fa042a71406964097e743c87a42c85a49
Restart Required: Yes
Instructions:
1. Update Linux kernel to patched version. 2. Check distribution-specific security advisories. 3. Reboot system after kernel update.
🔧 Temporary Workarounds
Disable SFQ scheduler
linuxRemove or disable SFQ scheduler configurations to prevent exploitation
tc qdisc del dev [interface] root sfq
Remove SFQ configurations from network scripts
🧯 If You Can't Patch
- Restrict access to tc command and network configuration tools
- Implement strict access controls to prevent local users from modifying network scheduler parameters
🔍 How to Verify
Check if Vulnerable:
Check kernel version and if SFQ scheduler is configured: tc qdisc show | grep sfq
Check Version:
uname -r
Verify Fix Applied:
Verify kernel version is updated beyond vulnerable versions and test SFQ configuration with limit parameter
📡 Detection & Monitoring
Log Indicators:
- Kernel panic logs
- UBSAN array-index-out-of-bounds errors
- System crash/reboot events
Network Indicators:
- Unusual tc command usage patterns
- Multiple SFQ configuration attempts
SIEM Query:
Search for 'UBSAN: array-index-out-of-bounds' or 'sch_sfq.c' in kernel logs
🔗 References
- https://git.kernel.org/stable/c/1348214fa042a71406964097e743c87a42c85a49
- https://git.kernel.org/stable/c/5e5e1fcc1b8ed57f902c424c5d9b328a3a19073d
- https://git.kernel.org/stable/c/6c589aa318023690f1606c666a7fb5f4c1c9c219
- https://git.kernel.org/stable/c/7d62ded97db6b7c94c891f704151f372b1ba4688
- https://git.kernel.org/stable/c/8fadc871a42933aacb7f1ce9ed9a96485e2c9cf4
- https://git.kernel.org/stable/c/b36a68192037d1614317a09b0d78c7814e2eecf9
- https://git.kernel.org/stable/c/b3bf8f63e6179076b57c9de660c9f80b5abefe70
- https://git.kernel.org/stable/c/d2718324f9e329b10ddc091fba5a0ba2b9d4d96a
- https://git.kernel.org/stable/c/f86293adce0c201cfabb283ef9d6f21292089bb8
- https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html