Key Information Vulnerability Type: Memory Corruption Affected Component: scheduler in the Linux kernel Issue Description: Under certain conditions, sub-queues can cause the parent queue's enqueue callback to re-enter. For , while this does not lead to UAF (Use After Free), the code adds the same classifier to the list twice, resulting in memory corruption. Fix: The patch checks whether a class is already added to the list to handle re-entry scenarios. Related Commits: - - Author and Submitter: - Author: Victor Nogueira () - Submitter: Greg Kroah-Hartman () Dates: - Author commit date: 2025-04-25 19:07:08 -0300 - Submitter commit date: 2025-05-09 09:41:40 +0200 Links: - Gerrard's report: https://lore.kernel.org/netdev/CAHcdcoM+030D2j6R0=YHKqmy=VgJ8xE0KuP6c7mSgnp-TEJJbw@mail.gmail.com/ - Patch link: https://patch.msgid.link/20250425220710.3964791-5-victor@mojatatu.com