
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
CVE-2025-38001 is a vulnerability discovered in the Linux kernel affecting the net_sched HFSC (Hierarchical Fair Service Curve) scheduler component. The vulnerability was disclosed on June 6, 2025, and involves a potential Use-After-Free (UAF) condition when HFSC is utilized with NETEM (NVD CVE Details).
The vulnerability stems from a bypass in a previous patch (141d34391abbb315d68556b7c67ad97885407547) that attempted to address reentrant enqueue issues. The flaw occurs because the patch only checks the cl->clnactive field to determine first insertion, but this field is only incremented by initvf. When using HFSCRSC (which uses inited), it becomes possible to bypass the check and insert the class twice in the eltree. This can lead to an infinite loop in hfsc_dequeue under normal conditions, but when combined with TBF as root qdisc configured with a very low rate, it can prevent packets from being dequeued, enabling subsequent insertions in the HFSC eltree and causing a UAF condition (NVD CVE Details).
The vulnerability can result in a Use-After-Free condition in the Linux kernel's network scheduling component, potentially leading to system instability or crashes. Additionally, under specific configurations involving TBF as root qdisc, the vulnerability can cause packet processing disruptions (NVD CVE Details).
The fix involves explicitly checking in hfscenqueue whether the class is already in the eltree whenever the HFSCRSC flag is set, particularly when netem is used as an hfsc child. This addresses both the UAF condition and the infinite loop issue (NVD CVE Details).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”