In the Linux kernel, the following vulnerability has been resolved:
net_sched: hfsc: Address reentrant enqueue adding class to eltree twice
Savino says:
"We are writing to report that this recent patch
(141d34391abbb315d68556b7c67ad97885407547) [1]
can be bypassed, and a UAF can still occur when HFSC is utilized with
NETEM.
The patch only checks the cl->cl_nactive field to determine whether
it is the first insertion or not [2], but this field is only
incremented by init_vf [3].
By using HFSC_RSC (which uses init_ed) [4], it is possible to bypass the
check and insert the class twice in the eltree.
Under normal conditions, this would lead to an infinite loop in
hfsc_dequeue for the reasons we already explained in this report [5].
However, if TBF is added as root qdisc and it is configured with a
very low rate,
it can be utilized to prevent packets from being dequeued.
This behavior can be exploited to perform subsequent insertions in the
HFSC eltree and cause a UAF."
To fix both the UAF and the infinite loop, with netem as an hfsc child,
check explicitly in hfsc_enqueue whether the class is already in the eltree
whenever the HFSC_RSC flag is set.
[1] https://web.git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=141d34391abbb315d68556b7c67ad97885407547
[2] https://elixir.bootlin.com/linux/v6.15-rc5/source/net/sched/sch_hfsc.c#L1572
[3] https://elixir.bootlin.com/linux/v6.15-rc5/source/net/sched/sch_hfsc.c#L677
[4] https://elixir.bootlin.com/linux/v6.15-rc5/source/net/sched/sch_hfsc.c#L1574
[5] https://lore.kernel.org/netdev/8DuRWwfqjoRDLDmBMlIfbrsZg9Gx50DHJc1ilxsEBNe2D6NMoigR_eIRIG0LOjMc3r10nUUZtArXx4oZBIdUfZQrwjcQhdinnMis_0G7VEk=@willsroot.io/T/#u
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
17 Dec 2025, 19:17
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Linux
Debian Debian debian Linux Linux linux Kernel |
|
| CPE | cpe:2.3:o:linux:linux_kernel:5.0:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.0:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.0:-:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.0:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.0:rc7:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.0:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:5.0:rc8:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:* |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| CWE | CWE-835 | |
| References | () https://git.kernel.org/stable/c/295f7c579b07b5b7cf2dffe485f71cc2f27647cb - Patch | |
| References | () https://git.kernel.org/stable/c/2c928b3a0b04a431ffcd6c8b7d88a267124a3a28 - Patch | |
| References | () https://git.kernel.org/stable/c/2f2190ce4ca972051cac6a8d7937448f8cb9673c - Patch | |
| References | () https://git.kernel.org/stable/c/39ed887b1dd2d6b720f87e86692ac3006cc111c8 - Patch | |
| References | () https://git.kernel.org/stable/c/4e38eaaabfb7fffbb371a51150203e19eee5d70e - Patch | |
| References | () https://git.kernel.org/stable/c/6672e6c00810056acaac019fe26cdc26fee8a66c - Patch | |
| References | () https://git.kernel.org/stable/c/a0ec22fa20b252edbe070a9de8501eef63c17ef5 - Patch | |
| References | () https://git.kernel.org/stable/c/ac9fe7dd8e730a103ae4481147395cc73492d786 - Patch | |
| References | () https://git.kernel.org/stable/c/e5bee633cc276410337d54b99f77fbc1ad8801e5 - Patch | |
| References | () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory | |
| References | () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory | |
| References | () https://syst3mfailure.io/rbtree-family-drama/ - Third Party Advisory |
03 Nov 2025, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
13 Jul 2025, 19:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
09 Jun 2025, 15:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
09 Jun 2025, 12:15
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
06 Jun 2025, 14:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-06-06 14:15
Updated : 2025-12-17 19:17
NVD link : CVE-2025-38001
Mitre link : CVE-2025-38001
CVE.ORG link : CVE-2025-38001
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-835
Loop with Unreachable Exit Condition ('Infinite Loop')
