In the Linux kernel, the following vulnerability has been resolved:
codel: remove sch->q.qlen check before qdisctreereduce_backlog()
After making all ->qlennotify() callbacks idempotent, now it is safe to remove the check of qlen!=0 from both fqcodeldequeue() and codelqdisc_dequeue().
[
{
"id": "CVE-2025-37798-2940e0a7",
"target": {
"file": "net/sched/sch_codel.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"185510761316838207333429395773163413407",
"28407077601832816848033953588919372977",
"85036723055278343731080255861182130136",
"291773644378645543097901327080926317712"
]
},
"deprecated": false,
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a57fe60ef4cf96bfbb6b58397ec28bdb5a5c6b31",
"signature_version": "v1"
},
{
"id": "CVE-2025-37798-2a02514c",
"target": {
"file": "net/sched/sch_codel.c",
"function": "codel_qdisc_dequeue"
},
"digest": {
"function_hash": "236878060480496071770225497253427350244",
"length": 518.0
},
"deprecated": false,
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@342debc12183b51773b3345ba267e9263bdfaaef",
"signature_version": "v1"
},
{
"id": "CVE-2025-37798-765d91f3",
"target": {
"file": "net/sched/sch_fq_codel.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"235232748896555591235002002151988647234",
"206989185561128578655143422801913240338",
"11133997129865598878995716898175389413",
"250466245658732502364644565705748018029"
]
},
"deprecated": false,
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a57fe60ef4cf96bfbb6b58397ec28bdb5a5c6b31",
"signature_version": "v1"
},
{
"id": "CVE-2025-37798-84418dcc",
"target": {
"file": "net/sched/sch_codel.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"185510761316838207333429395773163413407",
"28407077601832816848033953588919372977",
"85036723055278343731080255861182130136",
"291773644378645543097901327080926317712"
]
},
"deprecated": false,
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@342debc12183b51773b3345ba267e9263bdfaaef",
"signature_version": "v1"
},
{
"id": "CVE-2025-37798-936329f5",
"target": {
"file": "net/sched/sch_fq_codel.c",
"function": "fq_codel_dequeue"
},
"digest": {
"function_hash": "277500121410805835148491832123605099623",
"length": 1088.0
},
"deprecated": false,
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a57fe60ef4cf96bfbb6b58397ec28bdb5a5c6b31",
"signature_version": "v1"
},
{
"id": "CVE-2025-37798-97fc9cbe",
"target": {
"file": "net/sched/sch_fq_codel.c"
},
"digest": {
"threshold": 0.9,
"line_hashes": [
"235232748896555591235002002151988647234",
"206989185561128578655143422801913240338",
"11133997129865598878995716898175389413",
"250466245658732502364644565705748018029"
]
},
"deprecated": false,
"signature_type": "Line",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@342debc12183b51773b3345ba267e9263bdfaaef",
"signature_version": "v1"
},
{
"id": "CVE-2025-37798-c793c57a",
"target": {
"file": "net/sched/sch_fq_codel.c",
"function": "fq_codel_dequeue"
},
"digest": {
"function_hash": "277500121410805835148491832123605099623",
"length": 1088.0
},
"deprecated": false,
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@342debc12183b51773b3345ba267e9263bdfaaef",
"signature_version": "v1"
},
{
"id": "CVE-2025-37798-d064bff6",
"target": {
"file": "net/sched/sch_codel.c",
"function": "codel_qdisc_dequeue"
},
"digest": {
"function_hash": "236878060480496071770225497253427350244",
"length": 518.0
},
"deprecated": false,
"signature_type": "Function",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git@a57fe60ef4cf96bfbb6b58397ec28bdb5a5c6b31",
"signature_version": "v1"
}
]