Description
In the Linux kernel, the following vulnerability has been resolved:

netem: Update sch->q.qlen before qdisc_tree_reduce_backlog()

qdisc_tree_reduce_backlog() notifies parent qdisc only if child
qdisc becomes empty, therefore we need to reduce the backlog of the
child qdisc before calling it. Otherwise it would miss the opportunity
to call cops->qlen_notify(), in the case of DRR, it resulted in UAF
since DRR uses ->qlen_notify() to maintain its active list.
Published: 2025-02-18
Score: 7.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Use‑After‑Free (CWE‑416) in the Linux kernel's traffic‑control module could allow a local attacker to gain kernel‑level privileges or cause a denial of service
Action: Immediate Patch
AI Analysis

Impact

The vulnerability resides in the Linux kernel's network emulator (netem) component. A missing update to the backlog length (sch->q.qlen) before invoking qdisc_tree_reduce_backlog() causes a use‑after‑free (CWE‑416) in the DRR qdisc’s qlen_notify callback. If an attacker can trigger this flaw, the freed memory may later be re‑used by the kernel, potentially enabling arbitrary code execution at ring‑0 or causing a system crash.

Affected Systems

The flaw affects all Linux kernel releases that include the netem module, including release candidate 6.14 rc1 and earlier unpatched kernels. Any host running these kernels with netem enabled is susceptible. Based on the description, it is inferred that the impact is primarily local, requiring the attacker to run code with sufficient privileges to manipulate qdisc settings or to send traffic that engages the netem module.

Risk and Exploitability

The CVSS base score of 7.8 indicates high severity. The EPSS score is less than 1%, suggesting a very low current exploitation probability. The vulnerability is not listed in CISA’s KEV catalog. The likely attack vector is local, and the attacker would need to trigger a malformed backlog state. Based on the description, it is inferred that exploitation would involve manipulations that empty a child qdisc to trigger the use‑after‑free.

Generated by OpenCVE AI on April 28, 2026 at 19:08 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Linux kernel to the latest release that contains the netem backlog handling fix
  • If immediate kernel upgrade is not possible, remove or disable any custom qdisc rules that use the netem module until a patched kernel is available
  • Monitor system logs for qdisc backlog errors or kernel Oops messages to detect potential use‑after‑free conditions

Generated by OpenCVE AI on April 28, 2026 at 19:08 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-4102-1 linux-6.1 security update
EUVD EUVD EUVD-2025-4525 In the Linux kernel, the following vulnerability has been resolved: netem: Update sch->q.qlen before qdisc_tree_reduce_backlog() qdisc_tree_reduce_backlog() notifies parent qdisc only if child qdisc becomes empty, therefore we need to reduce the backlog of the child qdisc before calling it. Otherwise it would miss the opportunity to call cops->qlen_notify(), in the case of DRR, it resulted in UAF since DRR uses ->qlen_notify() to maintain its active list.
Ubuntu USN Ubuntu USN USN-7445-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-7448-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-7455-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-7455-2 Linux kernel (FIPS) vulnerabilities
Ubuntu USN Ubuntu USN USN-7455-3 Linux kernel (Real-time) vulnerabilities
Ubuntu USN Ubuntu USN USN-7455-4 Linux kernel (Oracle) vulnerabilities
Ubuntu USN Ubuntu USN USN-7455-5 Linux kernel (AWS) vulnerabilities
Ubuntu USN Ubuntu USN USN-7459-1 Linux kernel (Intel IoTG) vulnerabilities
Ubuntu USN Ubuntu USN USN-7459-2 Linux kernel (GCP) vulnerabilities
Ubuntu USN Ubuntu USN USN-7460-1 Linux kernel (Azure FIPS) vulnerabilities
Ubuntu USN Ubuntu USN USN-7461-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-7461-2 Linux kernel (FIPS) vulnerabilities
Ubuntu USN Ubuntu USN USN-7461-3 Linux kernel (Xilinx ZynqMP) vulnerabilities
Ubuntu USN Ubuntu USN USN-7462-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-7462-2 Linux kernel (AWS FIPS) vulnerabilities
Ubuntu USN Ubuntu USN USN-7475-1 Linux kernel (Xilinx ZynqMP) vulnerabilities
History

Mon, 03 Nov 2025 20:30:00 +0000

Type Values Removed Values Added
References

Mon, 24 Mar 2025 18:00:00 +0000

Type Values Removed Values Added
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.14:rc1:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel

Thu, 13 Mar 2025 12:30:00 +0000


Fri, 21 Feb 2025 14:00:00 +0000


Thu, 20 Feb 2025 02:45:00 +0000

Type Values Removed Values Added
Metrics threat_severity

Important

threat_severity

Moderate


Wed, 19 Feb 2025 14:00:00 +0000


Tue, 18 Feb 2025 16:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-416
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 18 Feb 2025 14:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: netem: Update sch->q.qlen before qdisc_tree_reduce_backlog() qdisc_tree_reduce_backlog() notifies parent qdisc only if child qdisc becomes empty, therefore we need to reduce the backlog of the child qdisc before calling it. Otherwise it would miss the opportunity to call cops->qlen_notify(), in the case of DRR, it resulted in UAF since DRR uses ->qlen_notify() to maintain its active list.
Title netem: Update sch->q.qlen before qdisc_tree_reduce_backlog()
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-04-02T08:39:25.388Z

Reserved: 2024-12-29T08:45:45.751Z

Link: CVE-2025-21703

cve-icon Vulnrichment

Updated: 2025-11-03T19:35:52.049Z

cve-icon NVD

Status : Modified

Published: 2025-02-18T15:15:18.633

Modified: 2025-11-03T20:17:10.003

Link: CVE-2025-21703

cve-icon Redhat

Severity : Moderate

Publid Date: 2025-02-18T00:00:00Z

Links: CVE-2025-21703 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T19:15:25Z

Weaknesses