CVE-2025-38001
Linux Kernel vulnerability analysis and mitigation

Overview

CVE-2025-38001 is a vulnerability discovered in the Linux kernel affecting the net_sched HFSC (Hierarchical Fair Service Curve) scheduler component. The vulnerability was disclosed on June 6, 2025, and involves a potential Use-After-Free (UAF) condition when HFSC is utilized with NETEM (NVD CVE Details).

Technical details

The vulnerability stems from a bypass in a previous patch (141d34391abbb315d68556b7c67ad97885407547) that attempted to address reentrant enqueue issues. The flaw occurs because the patch only checks the cl->clnactive field to determine first insertion, but this field is only incremented by initvf. When using HFSCRSC (which uses inited), it becomes possible to bypass the check and insert the class twice in the eltree. This can lead to an infinite loop in hfsc_dequeue under normal conditions, but when combined with TBF as root qdisc configured with a very low rate, it can prevent packets from being dequeued, enabling subsequent insertions in the HFSC eltree and causing a UAF condition (NVD CVE Details).

Impact

The vulnerability can result in a Use-After-Free condition in the Linux kernel's network scheduling component, potentially leading to system instability or crashes. Additionally, under specific configurations involving TBF as root qdisc, the vulnerability can cause packet processing disruptions (NVD CVE Details).

Mitigation and workarounds

The fix involves explicitly checking in hfscenqueue whether the class is already in the eltree whenever the HFSCRSC flag is set, particularly when netem is used as an hfsc child. This addresses both the UAF condition and the infinite loop issue (NVD CVE Details).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management