SB2025061009 - Use-after-free in Linux kernel sched
Published: June 10, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Use-after-free (CVE-ID: CVE-2025-38000)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the hfsc_enqueue() function in net/sched/sch_hfsc.c. A local user can escalate privileges on the system.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/1034e3310752e8675e313f7271b348914008719a
- https://git.kernel.org/stable/c/3f3a22eebbc32b4fa8ce9c1d5f9db214b45b9335
- https://git.kernel.org/stable/c/3f981138109f63232a5fb7165938d4c945cc1b9d
- https://git.kernel.org/stable/c/49b21795b8e5654a7df3d910a12e1060da4c04cf
- https://git.kernel.org/stable/c/89c301e929a0db14ebd94b4d97764ce1d6981653
- https://git.kernel.org/stable/c/93c276942e75de0e5bc91576300d292e968f5a02
- https://git.kernel.org/stable/c/f1dde3eb17dc1b8bd07aed00004b1e05fc87a3d4
- https://git.kernel.org/stable/c/f9f593e34d2fb67644372c8f7b033bdc622ad228