CVE-2025-38001

MEDIUM

Linux kernel - Use After Free

Title source: llm

Description

In the Linux kernel, the following vulnerability has been resolved: net_sched: hfsc: Address reentrant enqueue adding class to eltree twice Savino says: "We are writing to report that this recent patch (141d34391abbb315d68556b7c67ad97885407547) [1] can be bypassed, and a UAF can still occur when HFSC is utilized with NETEM. The patch only checks the cl->cl_nactive field to determine whether it is the first insertion or not [2], but this field is only incremented by init_vf [3]. By using HFSC_RSC (which uses init_ed) [4], it is possible to bypass the check and insert the class twice in the eltree. Under normal conditions, this would lead to an infinite loop in hfsc_dequeue for the reasons we already explained in this report [5]. However, if TBF is added as root qdisc and it is configured with a very low rate, it can be utilized to prevent packets from being dequeued. This behavior can be exploited to perform subsequent insertions in the HFSC eltree and cause a UAF." To fix both the UAF and the infinite loop, with netem as an hfsc child, check explicitly in hfsc_enqueue whether the class is already in the eltree whenever the HFSC_RSC flag is set. [1] https://web.git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=141d34391abbb315d68556b7c67ad97885407547 [2] https://elixir.bootlin.com/linux/v6.15-rc5/source/net/sched/sch_hfsc.c#L1572 [3] https://elixir.bootlin.com/linux/v6.15-rc5/source/net/sched/sch_hfsc.c#L677 [4] https://elixir.bootlin.com/linux/v6.15-rc5/source/net/sched/sch_hfsc.c#L1574 [5] https://lore.kernel.org/netdev/8DuRWwfqjoRDLDmBMlIfbrsZg9Gx50DHJc1ilxsEBNe2D6NMoigR_eIRIG0LOjMc3r10nUUZtArXx4oZBIdUfZQrwjcQhdinnMis_0G7VEk=@willsroot.io/T/#u

Exploits (5)

nomisec WORKING POC 93 stars
by 0xdevil · poc
https://github.com/0xdevil/CVE-2025-38001
nomisec WORKING POC 1 stars
by khoatran107 · poc
https://github.com/khoatran107/cve-2025-38001
nomisec WORKING POC
by aexdyhaxor · poc
https://github.com/aexdyhaxor/CVE-2025-38001
nomisec NO CODE
by ngobao2002 · poc
https://github.com/ngobao2002/CVE-2025-38001-test
nomisec WORKING POC
by boeseejykbtanke348 · poc
https://github.com/boeseejykbtanke348/CVE-2025-38001

Scores

CVSS v3 5.5
EPSS 0.0003
EPSS Percentile 7.9%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Details

CWE
CWE-835
Status published
Products (12)
debian/debian_linux 11.0
debian/debian_linux 12.0
linux/Kernel 5.0.0 - 5.4.294linux
linux/Kernel 5.11.0 - 5.15.185linux
linux/Kernel 5.16.0 - 6.1.141linux
linux/Kernel 5.5.0 - 5.10.238linux
linux/Kernel 6.13.0 - 6.14.10linux
linux/Kernel 6.15.0 - 6.15.1linux
linux/Kernel 6.2.0 - 6.6.93linux
linux/Kernel 6.7.0 - 6.12.32linux
... and 2 more
Published Jun 06, 2025
Tracked Since Feb 18, 2026