Out-of-Bounds Access Vulnerability in Linux Kernel with SFQ Scheduler
CVE-2025-37752
Key Information:
Badges
What is CVE-2025-37752?
CVE-2025-37752 is a vulnerability identified in the Linux kernel, specifically associated with the Stochastic Fairness Queueing (SFQ) scheduler. This critical flaw involves an out-of-bounds access issue, which could allow unauthorized entities to manipulate data within the kernel. If exploited, this vulnerability has the potential to lead to severe operational disruptions, including system crashes or unauthorized access, jeopardizing the integrity and stability of critical infrastructure that relies on the Linux operating system.
Technical Details
The vulnerability stems from an inadequate validation mechanism concerning user-defined limits within the SFQ configuration. Specifically, the flaw occurs during the update process of certain parameters where the limit is not properly validated against indirect updates. This deficiency can result in out-of-bounds access, where the kernel attempts to access memory locations beyond allocated limits, leading to potential instability or security breaches. The issue has been addressed by moving the limit validation check to ensure it is performed after all configuration updates.
Potential Impact of CVE-2025-37752
-
System Crashes: Exploitation of this vulnerability may lead to unexpected kernel crashes, impacting system availability and functionality. Such disruptions can be particularly detrimental for organizations relying on continuous uptime for their services.
-
Security Breaches: There is a risk of unauthorized access to sensitive data or system controls, as attackers could exploit the out-of-bounds access to manipulate kernel operations in a way that bypasses standard security protocols.
-
Operational Disruptions: Organizations may face significant operational challenges due to the vulnerability’s potential to destabilize network scheduling processes, leading to performance degradation and hampered resource allocation across networking hardware.
Affected Version(s)
Linux 1e6d9d87626cf89eeffb4d943db12cb5b10bf961 < 7d62ded97db6b7c94c891f704151f372b1ba4688
Linux 1b562b7f9231432da40d12e19786c1bd7df653a7 < 6c589aa318023690f1606c666a7fb5f4c1c9c219
Linux 35d0137305ae2f97260a9047f445bd4434bd6cc7 < 1348214fa042a71406964097e743c87a42c85a49
News Articles
Re: [PATCH openEuler-1.0-LTS 0/2] CVE-2025-37752 - Kernel - mailweb.openeuler.org
patchwork bot 21 May 2025 21 May '25 5:51...
CVE Trends Dashboard
We're in the process of developing the mobile version of our website to improve your browsing experience on smaller screens. Keep an eye out for its release in the near future.Thank you for your patience!

CVE-2025-37752 Impact, Exploitability, and Mitigation Steps | Wiz
Understand the critical aspects of CVE-2025-37752 with a detailed vulnerability assessment, exploitation potential, affected technologies, and remediation guidance.