{"id":"CVE-2025-37798","summary":"codel: remove sch-\u003eq.qlen check before qdisc_tree_reduce_backlog()","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ncodel: remove sch-\u003eq.qlen check before qdisc_tree_reduce_backlog()\n\nAfter making all -\u003eqlen_notify() callbacks idempotent, now it is safe to\nremove the check of qlen!=0 from both fq_codel_dequeue() and\ncodel_qdisc_dequeue().","modified":"2026-04-03T13:14:33.040281Z","published":"2025-05-02T14:16:02.623Z","related":["SUSE-SU-2025:01614-1","SUSE-SU-2025:01707-1","SUSE-SU-2025:01919-1","SUSE-SU-2025:01951-1","SUSE-SU-2025:01964-1","SUSE-SU-2025:01965-1","SUSE-SU-2025:01967-1","SUSE-SU-2025:01972-1","SUSE-SU-2025:01983-1","SUSE-SU-2025:02000-1","SUSE-SU-2025:02254-1","SUSE-SU-2025:02264-1","SUSE-SU-2025:02307-1","SUSE-SU-2025:02308-1","SUSE-SU-2025:02320-1","SUSE-SU-2025:02321-1","SUSE-SU-2025:02322-1","SUSE-SU-2025:02333-1","SUSE-SU-2025:02537-1","SUSE-SU-2025:02846-1","SUSE-SU-2025:02848-1","SUSE-SU-2025:02849-1","SUSE-SU-2025:02850-1","SUSE-SU-2025:02851-1","SUSE-SU-2025:02852-1","SUSE-SU-2025:02853-1","SUSE-SU-2025:02923-1","SUSE-SU-2025:02969-1","SUSE-SU-2025:02996-1","SUSE-SU-2025:02997-1","SUSE-SU-2025:03011-1","SUSE-SU-2025:03023-1","SUSE-SU-2025:03344-1","SUSE-SU-2025:20343-1","SUSE-SU-2025:20344-1","SUSE-SU-2025:20354-1","SUSE-SU-2025:20355-1","SUSE-SU-2025:20408-1","SUSE-SU-2025:20413-1","SUSE-SU-2025:20419-1","SUSE-SU-2025:20421-1","SUSE-SU-2025:20577-1","SUSE-SU-2025:20586-1","SUSE-SU-2025:20601-1","SUSE-SU-2025:20602-1","SUSE-SU-2025:21074-1","SUSE-SU-2025:21139-1","SUSE-SU-2025:21179-1","openSUSE-SU-2025:20081-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/37xxx/CVE-2025-37798.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/2f9761a94bae33d26e6a81b31b36e7d776d93dc1"},{"type":"WEB","url":"https://git.kernel.org/stable/c/342debc12183b51773b3345ba267e9263bdfaaef"},{"type":"WEB","url":"https://git.kernel.org/stable/c/4d55144b12e742404bb3f8fee6038bafbf45619d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7a742a9506849d1c1aa71e36c89855ceddc7d58e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/829c49b6b2ff45b043739168fd1245e4e1a91a30"},{"type":"WEB","url":"https://git.kernel.org/stable/c/a57fe60ef4cf96bfbb6b58397ec28bdb5a5c6b31"},{"type":"WEB","url":"https://git.kernel.org/stable/c/cc71a757da78dd4aa1b4a9b19cb011833730ccf2"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e73c838c80dccb9e4f19becc11d9f3cb4a27d483"},{"type":"WEB","url":"https://git.kernel.org/stable/c/eda741fe155ddf5ecd2dd3bfbd4fc3c0c7dbb450"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/37xxx/CVE-2025-37798.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-37798"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"76e3cc126bb223013a6b9a0e2a51238d1ef2e409"},{"fixed":"7a742a9506849d1c1aa71e36c89855ceddc7d58e"},{"fixed":"cc71a757da78dd4aa1b4a9b19cb011833730ccf2"},{"fixed":"eda741fe155ddf5ecd2dd3bfbd4fc3c0c7dbb450"},{"fixed":"829c49b6b2ff45b043739168fd1245e4e1a91a30"},{"fixed":"2f9761a94bae33d26e6a81b31b36e7d776d93dc1"},{"fixed":"4d55144b12e742404bb3f8fee6038bafbf45619d"},{"fixed":"e73c838c80dccb9e4f19becc11d9f3cb4a27d483"},{"fixed":"a57fe60ef4cf96bfbb6b58397ec28bdb5a5c6b31"},{"fixed":"342debc12183b51773b3345ba267e9263bdfaaef"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-37798.json"}}],"schema_version":"1.7.5"}