CVE-2025-53057
Amazon Corretto JDK vulnerability analysis and mitigation

Overview

CVE-2024-53057 is a vulnerability discovered in the Linux kernel's network scheduler API. The issue affects the qdisctreereduce_backlog functionality where Qdiscs with major handle ffff: are incorrectly assumed to be either root or ingress. This vulnerability was discovered by Budimir Markovic and affects Linux kernel versions from 2.6.25 up to versions before 4.19.323, 5.4.285, 5.10.229, 5.15.171, 6.1.116, 6.6.60, and 6.11.7 (NVD).

Technical details

The vulnerability stems from an invalid assumption in qdisctreereduce_backlog where Qdiscs with major handle ffff: are assumed to be either root or ingress, despite it being valid to create egress qdiscs with major handle ffff:. For qdiscs like DRR that maintain an active class list, this can result in a Use-After-Free (UAF) condition with a dangling class pointer. The vulnerability has been assigned a CVSS v3.1 base score of 7.8 (High) with the vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H (NVD).

Impact

The vulnerability can lead to a Use-After-Free condition, potentially allowing an attacker to execute arbitrary code with elevated privileges. The high CVSS score indicates that successful exploitation could result in complete compromise of confidentiality, integrity, and availability of the affected system (NVD).

Mitigation and workarounds

The vulnerability has been fixed in the Linux kernel by modifying the qdisctreereducebacklog functionality to stop when parent TCHROOT is reached. This is because the only way to retrieve ingress is when a hierarchy which does not contain a ffff: major handle calls into qdisclookup with TCHMAJ(TCHROOT). The fix involves changes to net/sched/sch_api.c with one line insertion and one deletion (NVD).

Additional resources


SourceThis report was generated using AI

Related Amazon Corretto JDK vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-50106HIGH8.1
  • Amazon Corretto JDKAmazon Corretto JDK
  • java-17-openjdk-static-libs-fastdebug
NoYesJul 15, 2025
CVE-2025-53066HIGH7.5
  • Amazon Corretto JDKAmazon Corretto JDK
  • java-21-openjdk-demo-fastdebug
NoYesOct 21, 2025
CVE-2025-53057MEDIUM5.9
  • Amazon Corretto JDKAmazon Corretto JDK
  • java-17-openjdk-javadoc-zip
NoYesOct 21, 2025
CVE-2025-30761MEDIUM5.9
  • Amazon Corretto JDKAmazon Corretto JDK
  • java-1.8.0-openjdk-slowdebug-debuginfo
NoYesJul 15, 2025
CVE-2025-61748LOW3.7
  • Amazon Corretto JDKAmazon Corretto JDK
  • java-25-openjdk-devel-fastdebug
NoYesOct 21, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management