We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-21965

sched_ext: Validate prev_cpu in scx_bpf_select_cpu_dfl()



Description

In the Linux kernel, the following vulnerability has been resolved: sched_ext: Validate prev_cpu in scx_bpf_select_cpu_dfl() If a BPF scheduler provides an invalid CPU (outside the nr_cpu_ids range) as prev_cpu to scx_bpf_select_cpu_dfl() it can cause a kernel crash. To prevent this, validate prev_cpu in scx_bpf_select_cpu_dfl() and trigger an scx error if an invalid CPU is specified.

Reserved 2024-12-29 | Published 2025-04-01 | Updated 2025-05-04 | Assigner Linux

Product status

Default status
unaffected

f0e1a0643a59bf1f922fa209cec86a170b784f3f before 752b56bb76e2471197d25d6948d85753043b10da
affected

f0e1a0643a59bf1f922fa209cec86a170b784f3f before 515680e76c536dd4aa8e2b5d674b0d441baddf5b
affected

f0e1a0643a59bf1f922fa209cec86a170b784f3f before 9360dfe4cbd62ff1eb8217b815964931523b75b3
affected

Default status
affected

6.12
affected

Any version before 6.12
unaffected

6.12.20
unaffected

6.13.8
unaffected

6.14
unaffected

References

git.kernel.org/...c/752b56bb76e2471197d25d6948d85753043b10da

git.kernel.org/...c/515680e76c536dd4aa8e2b5d674b0d441baddf5b

git.kernel.org/...c/9360dfe4cbd62ff1eb8217b815964931523b75b3

cve.org (CVE-2025-21965)

nvd.nist.gov (CVE-2025-21965)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-21965

Support options

Helpdesk Chat, Email, Knowledgebase