CVE-2025-38001
Published Jun 6, 2025
Last updated 4 days ago
- Description
- In the Linux kernel, the following vulnerability has been resolved: net_sched: hfsc: Address reentrant enqueue adding class to eltree twice Savino says: "We are writing to report that this recent patch (141d34391abbb315d68556b7c67ad97885407547) [1] can be bypassed, and a UAF can still occur when HFSC is utilized with NETEM. The patch only checks the cl->cl_nactive field to determine whether it is the first insertion or not [2], but this field is only incremented by init_vf [3]. By using HFSC_RSC (which uses init_ed) [4], it is possible to bypass the check and insert the class twice in the eltree. Under normal conditions, this would lead to an infinite loop in hfsc_dequeue for the reasons we already explained in this report [5]. However, if TBF is added as root qdisc and it is configured with a very low rate, it can be utilized to prevent packets from being dequeued. This behavior can be exploited to perform subsequent insertions in the HFSC eltree and cause a UAF." To fix both the UAF and the infinite loop, with netem as an hfsc child, check explicitly in hfsc_enqueue whether the class is already in the eltree whenever the HFSC_RSC flag is set. [1] https://web.git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=141d34391abbb315d68556b7c67ad97885407547 [2] https://elixir.bootlin.com/linux/v6.15-rc5/source/net/sched/sch_hfsc.c#L1572 [3] https://elixir.bootlin.com/linux/v6.15-rc5/source/net/sched/sch_hfsc.c#L677 [4] https://elixir.bootlin.com/linux/v6.15-rc5/source/net/sched/sch_hfsc.c#L1574 [5] https://lore.kernel.org/netdev/8DuRWwfqjoRDLDmBMlIfbrsZg9Gx50DHJc1ilxsEBNe2D6NMoigR_eIRIG0LOjMc3r10nUUZtArXx4oZBIdUfZQrwjcQhdinnMis_0G7VEk=@willsroot.io/T/#u
- Source
- 416baaa9-dc9f-4396-8d5f-8c081fb06d67
- NVD status
- Awaiting Analysis
- Hype score
- Not currently trending
2025-07-12 の人気記事はコチラでした。(自動ツイート) #Hacker_Trends ――― [CVE-2025-38001] Exploiting All Google kernelCTF Instances And Debian 12 With A 0-Day For $82k: A RBTree Family Drama (Part One: LTS & COS) https://t.co/o18JieEEim https://t.co/uKR
@motikan2010
13 Jul 2025
98 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Últimas noticias sobre #Hacking: En las últimas 24 horas, se han descubierto vulnerabilidades críticas en diversas plataformas como CVE-2025-38001 en Google y Debian 12, y CitrixBleed 2, además de un ataque a Gravity Forms de WordPress. Los parches... 👉 https://t.co/V4Uug
@JaimeARestrepo_
12 Jul 2025
9 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
URGENT: #Ubuntu 24.10/24.04 LTS kernel flaws (CVE-2025-38001, etc.) allow privilege escalation & network attacks. Patch via: sudo apt update && sudo apt upgrade. Read more: 👉https://t.co/alQePDB537 #LinuxSecurity https://t.co/TVamfHN1ZX
@Cezar_H_Linux
9 Jul 2025
32 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
🚨 Breaking: #Linux kernel real-time (RT) systems are vulnerable to CVE-2025-38001 (Netfilter bypass) and CVE-2025-37997 (InfiniBand leaks). Patch via sudo apt upgrade + reboot. Details: 👉 https://t.co/W9iKrcUVIs #InfoSec https://t.co/X22mGbU04m
@Cezar_H_Linux
2 Jul 2025
33 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Critical Linux Kernel (Real-time) Patch Alert! 🚀 CVE-2025-38001 & other flaws fixed in GPU, SMB, Netfilter. Read more: 👉 https://t.co/7VHqFLkBPu #Linux #Infosec #Ubuntu https://t.co/vC0C8n5Zpf
@Cezar_H_Linux
2 Jul 2025
12 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-38001 In the Linux kernel, the following vulnerability has been resolved: net_sched: hfsc: Address reentrant enqueue adding class to eltree twice Savino says: "We are… https://t.co/7PzcmtFfNJ
@CVEnew
6 Jun 2025
181 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes