Memory Management Flaw in Linux Kernel Affects HFSC Scheduling
CVE-2025-38001

Currently unrated

Key Information:

Vendor

Linux

Status
Vendor
CVE Published:
6 June 2025

Badges

📈 Score: 868👾 Exploit Exists🟡 Public PoC📰 News Worthy

What is CVE-2025-38001?

CVE-2025-38001 is a vulnerability identified in the Linux kernel related to memory management, specifically affecting the Hierarchical Fair Queuing Scheduler (HFSC). This vulnerability stems from an improper handling of the enqueue process when adding classes to the eltree structure, allowing for potential exploitation. When utilized with the NETEM module, the flaw can lead to a use-after-free (UAF) condition, which can further exacerbate system stability by causing infinite loops. If successfully exploited, this vulnerability could allow attackers to manipulate network traffic, induce system behavior anomalies, and potentially lead to further system compromise. The Linux kernel is a critical component of many operating systems and devices, making the implications of such a vulnerability far-reaching, especially in enterprise environments that rely on robust network management.

Potential impact of CVE-2025-38001

  1. Denial of Service (DoS): The vulnerability allows attackers to exploit the enqueue process, which can lead to infinite loops in the scheduler. This can effectively disrupt the normal operation of network services, resulting in a Denial of Service where legitimate traffic is blocked or delayed.

  2. Network Traffic Manipulation: By exploiting this flaw, an attacker could manipulate how network packets are processed, potentially leading to unauthorized access or interception of sensitive data. This compromises the integrity of data transmission within affected networks.

  3. Increased Attack Surface for Further Exploitation: A successful exploitation of this vulnerability could provide an attacker with a foothold to perform additional attacks, such as deploying malware or ransomware, which could escalate the impact significantly across interconnected systems.

Affected Version(s)

Linux 37d9cf1a3ce35de3df6f7d209bfb1f50cf188cea

Linux 37d9cf1a3ce35de3df6f7d209bfb1f50cf188cea < 6672e6c00810056acaac019fe26cdc26fee8a66c

Linux 37d9cf1a3ce35de3df6f7d209bfb1f50cf188cea < 2c928b3a0b04a431ffcd6c8b7d88a267124a3a28

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

News Articles

Researchers Exploited Google kernelCTF Instances And Debian 12 With A 0-Day

Researchers exploited CVE-2025-38001—a previously unknown Use-After-Free (UAF) vulnerability in the Linux HFSC queuing discipline—to compromise all Google kernelCTF instances (LTS, COS, and mitigation) as well as fully patched Debian 12 systems. 

1 month ago

Researchers Exploit 0-Day to Hack Google kernelCTF and Debian 12 Instances

The vulnerability, designated CVE-2025-38001, affects multiple Linux distributions including Debian 12, Ubuntu, and Google's Container-Optimized OS (COS).

1 month ago

Researchers Use 0-Day to Exploit Google kernelCTF and Debian 12

Security researchers have uncovered and weaponized a critical Use-After-Free vulnerability (CVE-2025-38001) in the Linux network packet.

1 month ago

References

Timeline

  • 📰

    First article discovered by GBHackers News

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2025-38001 : Memory Management Flaw in Linux Kernel Affects HFSC Scheduling